Skip survey header

Security+ Practice Quiz: SY0-601 Quiz 20

Enjoy the following 10 question quiz from TestOut.

1. Which of the following social engineering attacks uses voice over IP (VoIP) to gain sensitive information?
2. An attack that targets senior executives and high-profile victims is referred to as what?
3. Which area of focus helps to identify weak network architecture or design?

4. While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application.

Which type of security weakness does this describe?

5. Which type(s) of key(s) are used in symmetric cryptography?
6. How many keys are used with symmetric key cryptography?
7. Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which type of attack?
8. A router on the border of your network detects a packet with a source address that is from an internal client, but the packet was received on the internet-facing interface. This is an example of which form of attack?
9. Which of the following BEST describes an email security gateway?
10. Which type of malicious activity can be described as numerous unwanted and unsolicited e-mail messages sent to a wide range of victims?
This free quiz was provided by: