TEST BANK
COMPTIA
SECURITY+ SY0-
FOR MORE AFFORDABLE FILES CHECK OUT: WWW.MEDTESTBANKS.COM
601
M
EMAIL US ON MEDTESTBANKS@GMAIL.COM
EDITION: 5th edition
ED
AUTHORS: Omar Santos, Ron Taylor,
CO
Joseph Mlodzianowski
NN
OI
◊ PDF DOWNLOAD
SS
◊ ORIGINAL FROM PUBLISHER
EU
◊ALL CHAPTERS; COMPLETE GUIDE
R
◊ IMMEDIATE DOWNLOD AFTER ORDER
WWW.MEDTESTBANK.COM
,CompTIA Security+ SY0-601 Cert Guide 5th Edition Omar Santos
Chapter 1: Comparing and Contrasting Different Types of Social
Engineering Techniques
1. Which of these is an example of social engineering?
A. Phishing
B. Virus
C. Worm
D. Trojan horse
M
Answer: A
ED
2. Impersonating someone’s identity for the purpose of gaining information is called:
A. Phishing
CO
B. Spear phishing
C. Pretexting
D. Tailgating
NN
Answer: C
3. Smishing attacks are carried out using what medium?
A. Email
OI
B. Text messages
C. Websites
SS
D. Voice
Answer: B
EU
4. Which of these describes a threat actor redirecting a victim from a valid website to a malicious
fake?
R
A. Pharming
B. Tailgating
C. Dumpster diving
D. Phishing
Answer: A
5. Whaling is most similar to which other kind of attack?
A. Credential harvesting
B. Watering hole attack
C. Shoulder surfing
D. Phishing
,Answer: D
6. Which of these is NOT a type of social engineering attack?
A. Prepending
B. Piggybacking
C. Spear phishing
D. Pretexting
Answer: A
7. Which kind of attack targets users based on the common websites they frequent?
A. Pretexting
B. Watering hole attack
M
C. Eavesdropping
D. Vishing
ED
Answer: B
8. A social engineer calls an IT specialist sounding panicked and stating that they are an employee who
CO
needs to get into their email account right away to address a time-sensitive request from an
important client. Which motivation technique are they using?
A. Urgency
NN
B. Scarcity
C. Authority
D. Intimidation
OI
Answer: A
9. Which of these is NOT a best practice for avoiding social media attacks?
SS
A. Never share passwords or PINs.
B. Shield keypads and screens when entering authentication information.
EU
C. Examine any unknown removable media to make sure it does not contain malware.
D. Shred any sensitive information destined for garbage or recycling.
R
Answer: C
10. What government funded research association provides a set of matrices that document the
tactics attackers use to compromise systems?
A. The MITRE Corporation
B. W3C
C. The Social Engineering Toolkit
D. MAL*WAR
Answer: A
, Chapter 2: Analyzing Potential Indicators to Determine the Type of
Attack
1. Ransomware is a type of what?
A. Cryptoviral extortion
B. Distributed denial of service attack
C. Worm
D. Trojan horse
Answer: A
2. Which of these is a program that appears useful but allows an attacker administrator-level access to
M
a system?
ED
A. Worm
B. Keylogger
C. Rainbow table
CO
D. Remote access Trojan (RAT)
Answer: D
NN
3. What is the purpose of a rootkit?
A. Encrypt important files and ask for payment to decrypt them
B. Spread virus code by attaching to executable files
OI
C. Install at a low level and then perform malicious operations without being detected
D. Secretly record all keystrokes, including passwords
SS
Answer: C
4. Which of these is a key characteristic of a worm?
EU
A. Replicates by attaching itself to executable files
B. Self-replicates
C. Is able to crack weak passwords
R
D. Appears to be a legitimate program but contains malware
Answer: B
5. A keylogger is a form of what type of malware?
A. Spyware
B. Logic bomb
C. Virus
D. Ransomware
Answer: A
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MedConnoisseur. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $19.99. You're not tied to anything after your purchase.