CompTIA Security+ Exam Prep - Question List

Select how would you like to study

296. Which of the following is a major difference between a Worm and a Trojan horse?
  1. Worms spread via e-mail, while Trojan horses don’t.
  2. Worms are a form of malicious code, whereas Trojan horses are not.
  3. Both are the same.
  4. Worms self-replicate, while Trojan horses don’t.
297. David has just switched on his system and opened a word document. Surprisingly, the dialer started dialing the internet. What kind of an attack has probably occurred?
  1. ACK attack
  2. Worm
  3. Logic bomb
  4. Virus
298. Mr. Indecisive is assigned responsibility for creating the initial draft of the Risk Assessment. When
Mr. Newbie is assigned to help with prioritization of the threats identified in the Risk Assessment. Each potential threat is already listed, along with its likelihood and severity rating. In order to create a priority list and order the threats correctly, what should Mr. Newbie do?
  1. Organize the lists alphabetically and assign priority based on the order that the threats appear in the alphabetical lists.
  2. Create two lists-one is a priority list based on likelihood and the other is a priority list based on severity.
  3. Multiply the likelihood rating with the severity rating and then organize the list according to that number (the relative weight). The higher the relative weight, the higher the priority.
  4. Add the likelihood rating to the severity rating and then organize the list according to that number (the relative weight). The higher the relative weight, the higher the priority.
299. What are the four options for dealing with a risk?
  1. Accept, mitigate, transfer, and avoid
  2. Accept, insure, transfer, and avoid
  3. Accept, mitigate, reduce ,and avoid
  4. Situation, task, action, result
300. Will doesn’t know that Kenny is looking over his shoulder and taking notes on information displayed on Will’s computer monitor. What is Kenny doing?
  1. Security Surfing
  2. Perimeter Testing
  3. Shoulder Surfing
  4. Perimeter Surfing

Select how would you like to study