CompTIA Security+ Exam Prep - Question List

Select how would you like to study

121. Which of these attacks use more than one computer to attack a network or a victim?
  1. DoS
  2. DDoS
  3. UDP attack
  4. Worm
122. Jack is investigating the cause of his company’s failure in winning the bid for a project. He suspects that a hacker could have intervened in the communication session between his company’s employees. Which of the following attack types is he investigating on?
  1. Man-in-the-middle attack
  2. TCP/IP hijacking
  3. Back door attack
  4. Worm
123. Which protocol does the smurf attack use to attack a network or system?
  1. TCP
  2. IP
  3. UDP
  4. ICMP
124. What security model was developed in the 1970s to address the concerns of information leaks by the U.S. military?
  1. GUI Model
  2. State Machine Model
  3. Bella-LaPadula Model
  4. Transition Model
125. What security model addresses the integrity of data with applications, but is not concerned with security levels and confidentiality?
  1. GUI Model
  2. State Machine Model
  3. Bella-LaPadula Model
  4. Biba Model

Select how would you like to study