CompTIA Security+ Exam Prep - Question List

Select how would you like to study

286. Rick is a security guard at his job. He has worked there for the past 15 years and knows everyone by name and trusts them. Every so often there is a face he doesn’t recognize, but trusts the person that the individual is walking with. What would this situation be called?
  1. Tracking
  2. Porting
  3. Piggybacking
  4. Back-riding
287. Jack’s computer has been compromised. Someone has gained access and uploaded a bundle of tools that allow an attacker to enter the system at any time. What did the attacker upload?
  1. Bluetooth Vector
  2. Rootkit
  3. Rootbox
  4. Bluekit
288. What is the type of software that is installed on someone’s computer without their knowledge?
  1. Adware
  2. Spyware
  3. Both A and B
  4. Neither A nor B
289. If a hacker is not sure where to obtain information that they are not authorized to access, what may they do?
  1. Keep trying
  2. Try browsing
  3. Give up
  4. Wrap it up and move on
290. I wish to find as much information about as many people as possible without them knowing about it and I need to see who has modems. How should I go about this?
  1. Browsing
  2. Wardialing
  3. Line Attacks
  4. None of the Above

Select how would you like to study