CompTIA: Advanced Security Practitioner (CASP) Exam Prep - Question List

Select how would you like to study

186. Which of the following defines a condition that can occur when an application receives more data than it is programmed to accept?
  1. Spoofing
  2. Buffer Overflow
  3. Spam
  4. Back door entry
187. John is complaining that the contacts in his mailbox are receiving continuous e-mails from his ID, without him actually sending anything. Which of the following could have caused this?
  1. DoS
  2. Sniffing
  3. TCP/IP hijacking
  4. Worm
188. David switched on his system and opened his messenger application. Surprisingly, a Word document opens up instead. What kind of an attack has probably occurred?
  1. Sniffer attack
  2. Worm
  3. Virus
  4. Logic bomb
189. Which of the following is a term used to define a collection of software robots (bots) that run autonomously and automatically and may harm your computer?
  1. Automizer
  2. Botnet
  3. Soft bots
  4. Root kit
190. Which of the following is a major difference between a Worm and a Trojan horse?
  1. Worms spread via e-mail, while Trojan horses don’t.
  2. Worms are a form of malicious code, whereas Trojan horses are not.
  3. They are the same.
  4. Worms self replicate, while Trojan horses don’t.

Select how would you like to study