CompTIA Security+ Certification Exam SY0-701 Practice Test 10 Flashcards
Which of the following URLs is a potential indicator of a directory traversal attack?
A) http://www.example.com/var/../etc/passwd
B) http://www.example.com/var/www/../../etc/passwd
C) http://www.example.com/var/www/files/../../../etc/passwd
D) http://www.example.com/var/www/files/images/../../../../etc/passwd
E) Any of the above
E) Any of the above
A type of cryptographic attack that forces a network protocol to revert to its older, less secure version is known as:
A) Downgrade attack
B) Replay attack
C) Deauthentication attack
D) Spraying attack
A) Downgrade attack
Which cryptographic attack relies on the concepts of probability theory?
A) Brute-force
B) KPA
C) Dictionary
D) Birthday
D) Birthday
hash collision occurs when cryptographic hash function produces two different digests for the same data input.
A) True
B) False
B) False
A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:
A) Replay attack
B) Dictionary attack
C) Spraying attack
D) Birthday attack
C) Spraying attack
Which password attack bypasses account-lockout policies?
A) Birthday attack
B) Replay attack
C) Spraying attack
D) Dictionary attack
C) Spraying attack
An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is called:
A) Replay attack
B) Brute-force attack
C) Dictionary attack
D) Birthday attack
B) Brute-force attack
One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline.
A) True
B) False
A) True
A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities is called:
A) CVE
B) IoC
C) AIS
D) OSINT
B) IoC
An account lockout might indicate which type of malicious activity?
A) Attempt to deliver malicious content
B) DoS attack
C) Account compromise
D) Password brute-forcing attempt
D) Password brute-forcing attempt
Which of the terms listed below most accurately describes a situation wherein a single account is being used from multiple locations/devices at the same time?
A) Spraying attack
B) Concurrent session usage
C) Single Sign-On (SSO)
D) Impossible travel
B) Concurrent session usage
Which of the following terms refers to a malicious activity indicator in a situation where a firewall or other security measure prevents an attempt to deliver malicious payload or perform an unauthorized action?
A) DoS attack
B) Resource inaccessibility
C) Blocked content
D) Excessive system resource consumption
C) Blocked content
Which of the terms listed below most accurately describes a situation wherein an account is accessed from a location that is physically impossible for the user to be in?
A) Login time restrictions
B) Impossible travel
C) Concurrent session usage
D) Out-of-cycle logging
B) Impossible travel
The term “Out-of-cycle logging” refers to instances where systems or applications produce logs outside their regular intervals or in abnormal volumes, potentially signaling malicious activity.
A) True
B) False
A) True
Which of the following would indicate an attempt to hide evidence of malicious activity?
A) Account lockout
B) Resource inaccessibility
C) Missing logs
D) Concurrent session usage
C) Missing logs