Time limit: 0
Quiz Summary
0 of 9 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 9 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the practice exam, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the practice exam successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 9
1. Question
You discover that a co-worker of your company has installed spyware on 4 workstations with the aim to gather information about the company and send the information to another entity.
What type of threat you have just discovered?
CorrectIncorrect -
Question 2 of 9
2. Question
Upon reviewing the server logs, you noticed that a user uses a list of common passwords for many accounts to attempt to log in. What type of attack you have just noticed?
CorrectIncorrect -
Question 3 of 9
3. Question
A malicious user is trying to retrieve passwords by using software that attempts a number of passwords from a list of common passwords. What type of attack a malicious user is trying to perform?
CorrectIncorrect -
Question 4 of 9
4. Question
Which of the following type of attacks exploits the unauthenticated nature of 802.11 management frames and prevent users from connecting to the WAP?
CorrectIncorrect -
Question 5 of 9
5. Question
You want to download a piece of software that seems suspicious. After reading numerous reviews on the web claiming that the software is legitimate, you downloaded and installed it successfully. Later, you discover that the software was malicious and the developer of the software had made those fake reviews.
Which of the following principles of social engineering the malicious developer used?
CorrectIncorrect -
Question 6 of 9
6. Question
You have just received an email advertising the newest version of the iPhone, which is not available elsewhere and it’s only one stock available. The email includes a “buy now” button which is a malicious link.
Which of the following principles is the email author using?
CorrectIncorrect -
Question 7 of 9
7. Question
What type of attack is a birthday attack?
CorrectIncorrect -
Question 8 of 9
8. Question
You have just released your new mobile app in the App Store. Your App went quickly viral and malicious actors started sending malicious traffic to the server which runs the app.
What type of denial-of-service attack is this?
CorrectIncorrect -
Question 9 of 9
9. Question
In which type of denial-of-service attack belongs the DNS Amplification?
CorrectIncorrect