CompTIA Security+ Exam Prep - Question List

Select how would you like to study

36. Which of the following TCP attacks tweaks the TCP three-way handshake process in an attempt to overload network servers, resulting in authorized users being denied access to network resources?
  1. Snooping
  2. Smurf attack
  3. SYN attack
  4. Man in the middle
37. Which of the following transmission media is least susceptible to a vampire tap placed on the line?
  1. Fiber
  2. Coaxial
  3. UTP
  4. STP
38. Which of the following attacks involves the attacker gaining access to a host on the network and logically disconnecting it?
  1. TCP/IP Hijacking
  2. UDP Attack
  3. ICMP Attacks
  4. Smurf Attacks
39. Which of the following is an area on the network that allows a technician to place a public-facing system on it without compromising the entire infrastructure?
  1. VLAN
  2. VPN
  3. NAT
  4. DMZ
40. Which of these attacks use more than one computer to attack a network or a victim?
  1. DoS
  2. DDoS
  3. UDP attack
  4. Worm

Select how would you like to study