Section 2.4 Demonstrate your acquired knowledge about analyzing indicators of malicious activity. This will demonstrate your proficiency for section 2.4 of the Security+ SY0-701 objectives. 1 / 25 What indicator suggests an attacker accessed a system from geographically impossible locations in short time? Blocked content Impossible travel Out-of-cycle logging Published incident 2 / 25 Which password attack targets many accounts with a few common passwords? Brute force Password spraying Replay attack Injection flooding 3 / 25 A cryptographic event where two different inputs produce the same hash is a: Birthday attack Collision Keylogging event Worm infestation 4 / 25 Forcing a downgrade to a weaker security protocol to exploit communications is a: Injection attack Downgrade attack Race condition Virus escalation 5 / 25 Forcing a system to access directories outside of intended paths is called: Forgery Directory traversal Worm spread RFID cloning 6 / 25 Exploiting unsanitized input to manipulate application behavior is called: Logic bomb Injection attack Amplified DDoS Credential replay 7 / 25 Reusing stolen authentication tokens to access systems describes: Wireless flooding Brute forcing Credential replay Downgrade attack 8 / 25 Intercepting and modifying communication between two parties defines a: On-path attack Keylogger infection RFID cloning Birthday attack 9 / 25 A wireless attack that captures unencrypted traffic is best described as: Brute force Injection attack Wireless interception Forgery attempt 10 / 25 Modifying DNS records to redirect users to malicious websites refers to: On-path attack Credential replay DNS attack Collision attack 11 / 25 A DDoS attack where requests appear to come from legitimate sources is called: Amplified DDoS Reflected DDoS Replay DDoS Credential spraying 12 / 25 Which form of DDoS manipulates packet headers to overwhelm a system? Worm flood Amplified DDoS RFID cloning Buffer overflow 13 / 25 What type of attack floods a service with traffic from multiple sources? DDoS Replay attack Worm propagation On-path attack 14 / 25 Excessive humidity damaging a server room is classified as what attack type? Malware Environmental Wireless Injection 15 / 25 Duplicating a wireless badge for unauthorized access refers to: RFID cloning Logic bombing Resource inaccessibility Credential replay 16 / 25 An attacker repeatedly guessing login credentials is attempting which attack? Replay attack Brute force attack Forgery attack Buffer overflow 17 / 25 Which malware hides its presence from operating systems and antivirus tools? Worm Bloatware Rootkit Spyware 18 / 25 A time-delayed malicious event triggered by specific conditions describes a: Rootkit Keylogger Logic bomb Virus 19 / 25 Malicious software designed to capture user keystrokes is known as a: Trojan Keylogger Bloatware Worm 20 / 25 A malware that attaches itself to a program and requires activation is a: Keylogger Virus Spyware Worm 21 / 25 Unnecessary pre-installed software that reduces system performance is called: Trojan Bloatware Spyware Rootkit 22 / 25 Software that secretly monitors and collects user information is classified as: Spyware Logic bomb Worm Ransomware 23 / 25 Which malware self-replicates and spreads without requiring user action? Virus Worm Trojan Keylogger 24 / 25 A seemingly legitimate application that secretly performs malicious activities is a: Trojan Worm Logic bomb Bloatware 25 / 25 A malware type that encrypts a victim’s files and demands payment is known as: Trojan Rootkit Ransomware Keylogger Your score isThe average score is 0% 0% Restart quiz Return to CompTia N+ 10-009 Objectives