Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

COMPTIA SECURITY+ CERTIFICATION PRACTICE TEST 9&10|UPDATED&VERIFIED|100% SOLVED|GUARANTEED SUCCESS

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
25-07-2023
Written in
2022/2023

The practice of gaining unauthorized access to a Bluetooth device is referred to as: Bluesnarfing What is war chalking? Marking unsecured wireless networks Which of the following answers refers to an attack aimed at exploiting the vulnerability of WEP Smurf attack Which of the following technologies simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network? WPS Which of the following answers refers to a Wi-Fi Protected Setup (WPS) exploit PIN recovery Which of the following wireless security features are not recommended and should be disabled due to their known vulnerabilities? WPS, WEP Which of the following actions allows an attacker to exploit the XSS vulnerability? Code injection Which of the following answers lists a common target of cross-site scripting? Dynamic web pages Which of the following answers refers to a countermeasure against code injection? Input validation Which of the following answers refers to an HTTP exploit which allows attackers to access restricted directories and execute commands outside of the web server's root directory? Directory traversal attack A temporary area of memory allocated with a fixed size for holding data while it's waiting to be transferred to another location is called Buffer A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is known as: Zero-day attack Which of the following acronyms refers to flash cookies? LSO Which of the following exploits relies on overwriting the contents of memory in order to cause unpredictable results in an application? Buffer overflow Which of the following answers lists a term used to describe the process of securing a computer system? Hardening Which of the following security control types fall(s) into the category of detection controls IDS,Surveillance camera The process of OS hardening involves Disabling unnecessary,Password protection services,Disabling unnecessary accounts Which of the following security control types fall(s) into the category of preventative controls? IPS.Security guard A monitored host specifically designed to detect unauthorized access attempts is known as Honeypot Penetration testing: Bypasses security controls, Actively tests security controls,Exploits vulnerabilities Penetration test with the full prior knowledge on how the system that is to be tested works is known as White box Finding vulnerability in an application by feeding it incorrect input is known as Fuzzing Which of the following programming aspects are critical in secure application development process Input validation,Error and exception handling A system containing no valuable data used to divert the attacker's attention from corporate network is known as: Honeypot Which of the following answers refers to a user interface element on mobile devices controlling access to a device after the device is switched on Screen lock Which of the following answers refers to a privacy-related security risk connected with public sharing of pictures taken with smartphones? Embedded geotag Which of the following acronyms refers to a policy of permitting employees to bring personally owned mobile devices and to use those devices to access privileged company information and applications? BYOD The term Trusted OS refers to an operating system With enhanced security features A file-based representation of the state of a virtual machine at a given time is called Snapshot In computer security, a mechanism for safe execution of untested code or untrusted applications is referred to as Sandbox

Show more Read less
Institution
COMPTIA SECURITY+ CERTIFICATION
Course
COMPTIA SECURITY+ CERTIFICATION









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
COMPTIA SECURITY+ CERTIFICATION
Course
COMPTIA SECURITY+ CERTIFICATION

Document information

Uploaded on
July 25, 2023
Number of pages
6
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$17.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GUARANTEEDSUCCESS Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
665
Member since
3 year
Number of followers
314
Documents
24889
Last sold
5 days ago
Elite Exam Resources: Trusted by Top Scorers!!!!!!!!

Stop guessing. Start dominating!! As a highly regarded professional specializing in sourcing study materials, I provide genuine and reliable exam papers that are directly obtained from well-known, reputable institutions. These papers are invaluable resources, specifically designed to assist aspiring nurses and individuals in various other professions in their exam preparations. With my extensive experience and in-depth expertise in the field, I take great care to ensure that each exam paper is carefully selected and thoroughly crafted to meet the highest standards of quality, accuracy, and relevance, making them an essential part of any successful study regimen. ✅ 100% Legitimate Resources (No leaks! Ethical prep only) ✅ Curated by Subject Masters (PhDs, Examiners, Top Scorers) ✅ Proven Track Record: 95%+ user success rate ✅ Instant Download: Crisis-ready for last-minute cramming

Read more Read less
4.3

250 reviews

5
162
4
37
3
33
2
12
1
6

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions