CompTIA: Advanced Security Practitioner (CASP) Exam Prep - Question List

Select how would you like to study

171. Which of the following situations would incline you to use a vulnerability scanner?
  1. Enabling a protocol-analyzing capability.
  2. Enabling remote access.
  3. Enabling encryption.
  4. Identifying ports that are open on the computer.
172. Which of the following password-guessing attacks continue attacking until a successful guess occurs?
  1. Guess attack
  2. Password guess attack
  3. Dictionary attack
  4. Brute force attack
173. John is a receiving a lot of spam through the Bluetooth connection in his PDA. What kind of vulnerability is he facing?
  1. Blue mail
  2. Blue spam
  3. Bluesnarfing
  4. Blue jacking
174. David is a security administrator at his organization. He is trying to prevent unauthorized access to the corporate wireless network by people loafing around the office. What kind of wireless network threat is he trying to curb?
  1. Man-in-the-middle
  2. War driving
  3. Dictionary attack
  4. DNS spoofing
175. Which of the following is a Bluetooth-based attack that relates to gaining unauthorized access through a Bluetooth connection?
  1. Blue-theft
  2. Blue-access
  3. Blue jacking
  4. Bluesnarfing

Select how would you like to study