CompTIA: Advanced Security Practitioner (CASP) Exam Prep - Question List

Select how would you like to study

176. Which of the following best describes domain name kiting?
  1. It is a practice of hacking domain names.
  2. It is the practice of transferring domain names.
  3. It is the process of erasing the DNS records of a domain name.
  4. It is the practice of repeatedly registering and deleting a domain name so that in effect, the registrant can own the domain name without paying for it.
177. Which of these attacks use more than one computer to attack a network or a victim?
  1. DoS
  2. DDoS
  3. UDP attack
  4. Worm
178. Jack is investigating the cause of his company’s failure in winning the bid for a project. He suspects that a hacker could have intervened in the communication session between his company’s employees. Which of the following attack types is he investigating on?
  1. Man-in-the-middle attack
  2. TCP/IP hijacking
  3. Back door attack
  4. Worm
179. John is a Security Administrator at his organization. He is observing repeated unsuccessful attempts from a hacker to submit a Kerberos certificate and have it be validated by the authentication system. What is this attack called?
  1. Man-in-the-middle attack
  2. Back door attack
  3. Replay attack
  4. TCP/IP hijacking
180. David is the Security Administrator at his organization. He is investigating an issue where the corporate server will not accept any connections using the TCP protocol. On close inspection he sees that the server indicates that it has exceeded its session limit. Which type of attack is this?
  1. TCP ACK attack
  2. TCP/IP hijacking
  3. Smurf attack
  4. Virus attack

Select how would you like to study