100% Free Exams (No login or credit card required)

Section 2.4

Demonstrate your acquired knowledge about analyzing indicators of malicious activity. This will demonstrate your proficiency for section 2.4 of the Security+ SY0-701 objectives.

1 / 25

What indicator suggests an attacker accessed a system from geographically impossible locations in short time?

2 / 25

Which password attack targets many accounts with a few common passwords?

3 / 25

A cryptographic event where two different inputs produce the same hash is a:

4 / 25

Forcing a downgrade to a weaker security protocol to exploit communications is a:

5 / 25

Forcing a system to access directories outside of intended paths is called:

6 / 25

Exploiting unsanitized input to manipulate application behavior is called:

7 / 25

Reusing stolen authentication tokens to access systems describes:

8 / 25

Intercepting and modifying communication between two parties defines a:

9 / 25

A wireless attack that captures unencrypted traffic is best described as:

10 / 25

Modifying DNS records to redirect users to malicious websites refers to:

11 / 25

A DDoS attack where requests appear to come from legitimate sources is called:

12 / 25

Which form of DDoS manipulates packet headers to overwhelm a system?

13 / 25

What type of attack floods a service with traffic from multiple sources?

14 / 25

Excessive humidity damaging a server room is classified as what attack type?

15 / 25

Duplicating a wireless badge for unauthorized access refers to:

16 / 25

An attacker repeatedly guessing login credentials is attempting which attack?

17 / 25

Which malware hides its presence from operating systems and antivirus tools?

18 / 25

A time-delayed malicious event triggered by specific conditions describes a:

19 / 25

Malicious software designed to capture user keystrokes is known as a:

20 / 25

A malware that attaches itself to a program and requires activation is a:

21 / 25

Unnecessary pre-installed software that reduces system performance is called:

22 / 25

Software that secretly monitors and collects user information is classified as:

23 / 25

Which malware self-replicates and spreads without requiring user action?

24 / 25

A seemingly legitimate application that secretly performs malicious activities is a:

25 / 25

A malware type that encrypts a victim’s files and demands payment is known as:

Your score is

The average score is 0%

0%