Home > Articles > Certification > CompTIA

  • Print
  • + Share This
This chapter is from the book

Quick-Check Answer Key

Objective 3.1: Analyze and differentiate among types of malware.

  1. A
  2. C
  3. A
  4. B
  5. C
  6. B
  7. A
  8. C
  9. A, B, C
  10. A
  11. D
  12. C
  13. A
  14. D
  15. B
  16. A
  17. B
  18. A
  19. A, B, D
  20. A, C
  21. C
  22. D
  23. B
  24. A
  25. B
  26. C
  27. B
  28. A, C, D
  29. D
  30. C
  31. B
  32. A, B, C
  33. A, C
  34. B, C, D
  35. D
  36. A
  37. B
  38. A
  39. C
  40. A, C, D

Objective 3.2: Analyze and differentiate among types of attacks.

  1. C
  2. A, B
  3. C
  4. A
  5. B
  6. D
  7. D
  8. B
  9. C
  10. A, B, D
  11. A
  12. B
  13. D
  14. C
  15. B
  16. D
  17. B, C, D
  18. B
  19. C, D
  20. A, B
  21. A, C, D
  22. A, D
  23. C
  24. D
  25. B
  26. C
  27. C
  28. A
  29. D
  30. B
  31. D
  32. C
  33. C
  34. A
  35. A
  36. D
  37. B, C
  38. D
  39. A
  40. B
  41. D
  42. C
  43. B
  44. D
  45. B

Objective 3.3: Analyze and differentiate among types of social engineering attacks.

  1. B
  2. C
  3. B
  4. A
  5. D
  6. D
  7. B
  8. A
  9. C
  10. D

Objective 3.4: Analyze and differentiate among types of wireless attacks.

  1. B
  2. D
  3. C
  4. A, B, C
  5. C
  6. D
  7. A
  8. C
  9. B
  10. C
  11. A
  12. D
  13. B
  14. A
  15. B
  16. C
  17. A
  18. B
  19. D
  20. A

Objective 3.5: Analyze and differentiate among types of application attacks.

  1. A, D
  2. C
  3. B
  4. B, C
  5. A
  6. C
  7. B
  8. D
  9. A
  10. D
  11. B
  12. A
  13. B
  14. B, C
  15. A, D
  16. B, C
  17. A
  18. A, B, C
  19. A, C
  20. D
  21. B
  22. A
  23. B
  24. A, C
  25. C

Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques.

  1. B
  2. C
  3. B, C
  4. A
  5. C
  6. D
  7. A
  8. A, B, D
  9. A
  10. B
  11. A, B, D
  12. D
  13. C
  14. A
  15. D
  16. B, C
  17. C
  18. D
  19. C
  20. A, B, D
  21. D
  22. D
  23. B, C
  24. B
  25. C
  26. A, C, D
  27. B
  28. C
  29. A, B
  30. B, C
  31. D
  32. C
  33. B
  34. D
  35. B
  36. B
  37. A
  38. C
  39. D
  40. C

Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities.

  1. A
  2. D
  3. C
  4. B
  5. D
  6. A
  7. A
  8. C
  9. D
  10. B
  11. D
  12. A
  13. D
  14. B
  15. C

Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.

  1. B
  2. A, C
  3. B, C
  4. D
  5. A
  6. A
  7. B
  8. B
  9. C
  10. A
  • + Share This
  • 🔖 Save To Your Account