CompTIA Security+ Exam Prep - Question List

Select how would you like to study

41. Jack is investigating the cause of his company’s failure in winning the bid for a project. He suspects that a hacker could have intervened in the communication session between his company’s employees. Which of the following attack types is he investigating on?
  1. Man-in-the-middle attack
  2. TCP/IP hijacking
  3. Back door attack
  4. Worm
42. John is a Security Administrator at his organization. He is observing repeated unsuccessful attempts from a hacker to submit a Kerberos certificate and have it be validated by the authentication system. What is this attack called?
  1. Man-in-the-middle attack
  2. Back door attack
  3. Replay attack
  4. TCP/IP hijacking
43. David is the Security Administrator at his organization. He is investigating an issue where the corporate server will not accept any connections using the TCP protocol. On close inspection he sees that the server indicates that it has exceeded its session limit. Which type of attack is this?
  1. TCP ACK attack
  2. TCP/IP hijacking
  3. Smurf attack
  4. Virus attack
44. Which protocol does the smurf attack use to attack a network or system?
  1. TCP
  2. IP
  3. UDP
  4. ICMP
45. You are working as a Security Advisor at your organization. On observing an employee’s system log files report, you notice unsuccessful ongoing attempts to gain access to a single user account on the computer. What is this attack called?
  1. TCP/IP hijacking
  2. Password guessing attack
  3. Man-in-the-middle attack
  4. Worm attack

Select how would you like to study