CompTIA A+ Core 2 Objective 2.4 – Security – Threats and Vulnerabilities

Posted by:

|

On:

|

Threats and Vulnerabilities

1 / 21

What is a primary cybersecurity concern associated with Bring Your Own Device (BYOD) policies?

2 / 21

What best describes an insider threat in cybersecurity?

3 / 21

What is the main characteristic of a brute-force attack?

4 / 21

What is an effective method to mitigate the risk of a dictionary attack against user passwords?

5 / 21

Which of the following best describes a cross-site scripting (XSS) attack?

6 / 21

What is the main purpose of spoofing in cybersecurity attacks?

7 / 21

What strategy is effective in reducing the risk posed by insider threats?

8 / 21

An IT manager notices unusual network activity traced back to a senior developer’s credentials, suggesting potential unauthorized access to sensitive project data. What should be the first action?

9 / 21

What makes an unprotected system a critical concern for cybersecurity?

10 / 21

What is the primary risk associated with unpatched systems within an IT infrastructure?

11 / 21

What is the primary goal of an SQL injection attack?

12 / 21

What is an on-path attack?

13 / 21

An e-commerce company suddenly experiences a massive surge in traffic, causing its website to become unresponsive. Suspecting a DDoS attack, what should be the company’s initial response?

14 / 21

What is the primary goal of a Distributed Denial of Service (DDoS) attack on a company’s web servers?

15 / 21

Which of the following is a key indicator of a brute-force attack in progress?

16 / 21

What characterizes a zero-day attack?

17 / 21

How does a Denial of Service (DoS) attack differ from a Distributed Denial of Service (DDoS) attack?

18 / 21

What is a fundamental practice to defend against SQL injection attacks?

19 / 21

What action can significantly reduce the risk of falling victim to an on-path (man-in-the-middle) attack?

20 / 21

Why are non-compliant systems considered a significant vulnerability in organizational cybersecurity?

21 / 21

Why are end-of-life (EOL) operating systems a significant security vulnerability?

Your score is

Exit