You are on page 1of 11

CompTIA Security+ Pre-Assessment Skills Test

Alex Castrejón – Estephanie Miranda


Daniel Hurtado – Gabriel Gutierrez
21. Which of the following types of malware can self-propagate?

A. Adware
B. Worm
C. Virus
D. Spyware
22. A TCP SYN Flood attack is an
example of what type of attack?
(CHOOSE TWO)
A. DDoS
B. DoS
C. Smurf Attack
D. Replay Attack
23. 3. Which of the following is an example of a password cracking
attack?

A. XMAS Attack
B. Watering Hole Attack
C. Dictionary Attack
D. URL Hijacking
24. All of the following are examples of system hardening except for?

A. Disabling unnecessary services


B. Closing unused ports
C. Ensuring patches are up to date
D. Detecting system intrusions
25. When a computer application receives more data than it is
programmed to accept, this is known as?

A. Buffer Overflow
B. Zero-day Exploit
C. Malicious Add-on
D. LDAP Injection
26. An initialization vector (IV) attack is used to compromise which
type of networking systems?

A. Wired
B. Wireless
C. Fiber Optic
D. DSL
27. DDoS attacks are usually implemented by which type of malware
attack?

A. Logic Bomb
B. Backdoor
C. Botnet
D. Ransomware
28. What is the name of an attack that exploits an unidentified
vulnerability?

A. Session Hijacking
B. Cross-Site Scripting
C. SQL Injection
D. Zero-Day
29. Which of the following types of security
assessments is considered intrusive?

A. Vulnerability Scanning
B. Penetration Testing
C. Port Scanning
D. Ping Scanning
30. What type of malware is primarily designed to hide itself from the
operating system?

A. Rootkit
B. Polymorphic
C. Armored
D. Trojan

You might also like