100% Free Exams (No login or credit card required)

Section 2.3

Demonstrate your acquired knowledge explaining various types of vulnerabilities. This will demonstrate your proficiency for section 2.3 of the Security+ SY0-701 objectives.

1 / 25

A vulnerability introduced by failing to secure cloud storage buckets would be:

2 / 25

A database susceptible to unauthorized queries is vulnerable to:

3 / 25

Which type of vulnerability exploits user trust in visual content?

4 / 25

A zero-day vulnerability is best described as:

5 / 25

Bypassing manufacturer restrictions on mobile operating systems is called:

6 / 25

What mobile device vulnerability results from manually installing unauthorized apps?

7 / 25

Open administrative ports exposed to the public is an example of:

8 / 25

Which cryptographic vulnerability allows weak or compromised encryption keys?

9 / 25

If a manufacturer installs insecure firmware onto routers, it is a:

10 / 25

A service provider failing to patch their managed systems could cause:

11 / 25

If a supplier embeds malware into legitimate software, it is a:

12 / 25

What makes cloud environments vulnerable compared to on-premises data centers?

13 / 25

Which virtualization vulnerability occurs when memory isn’t cleared between VM sessions?

14 / 25

A threat actor escaping from a guest VM to control the host system is an example of:

15 / 25

A system still running outdated, unsupported software is vulnerable due to:

16 / 25

Using hardware no longer supported by manufacturers exposes:

17 / 25

Exploiting a device’s firmware vulnerabilities affects which layer?

18 / 25

An attacker embeds malicious scripts into a website to target visitors. This is:

19 / 25

SQL injection attacks primarily target:

20 / 25

Which is considered an OS-based vulnerability?

21 / 25

Installing compromised patches from an unauthorized source describes:

22 / 25

A race condition that occurs between validation and execution is called:

23 / 25

Which vulnerability exploits a delay between checking and using a resource?

24 / 25

A vulnerability that lets attackers overwrite adjacent memory locations is called:

25 / 25

Which application vulnerability occurs when untrusted data is injected into memory?

Your score is

The average score is 0%

0%