CompTIA: Advanced Security Practitioner (CASP) Exam Prep - Question List

Select how would you like to study

181. Which protocol does the smurf attack use to attack a network or system?
  1. TCP
  2. IP
  3. UDP
  4. ICMP
182. You are working as a Security Advisor at your organization. On observing an employee’s system log files report, you notice unsuccessful ongoing attempts to gain access to a single user account on the computer. What is this attack called?
  1. TCP/IP hijacking
  2. Password guessing attack
  3. Man-in-the-middle attack
  4. Worm attack
183. Which of the following attacks involves the attacker gaining access to a host on the network and logically disconnecting it?
  1. TCP/IP Hijacking
  2. UDP Attack
  3. ICMP Attacks
  4. Smurf Attacks
184. Which of the following TCP attacks tweaks the TCP three-way handshake process in an attempt to overload network servers, resulting in authorized users being denied access to network resources?
  1. Snooping
  2. Smurf attack
  3. SYN attack
  4. Man in the middle
185. John observes that a server in his network has a program running on it that bypasses authorization. Which type of attack has occurred?
  1. DoS
  2. DDoS
  3. Social engineering
  4. Back door

Select how would you like to study