Search Header Logo
Most Missed #4

Most Missed #4

Assessment

Presentation

Computers

9th Grade

Practice Problem

Hard

Created by

Eric Asel

Used 6+ times

FREE Resource

16 Slides • 16 Questions

1

ITF+ Most Missed Q's

media

2

Multiple Choice

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

1

Prioritization

2

Redundancy

3

Replication

4

Fault Taulerance

3

Prioritization.

Prioritization refers to the act of ranking the importance of recovering different types of data during a disaster recovery exercise. Since the company wants to ensure customer data is recovered before operational data, it emphasizes the importance of prioritizing customer data in the recovery process.

4

This involves having duplicate systems or components to ensure continued operation if one fails.

It's not Redundancy

This refers to a system's ability to continue operating despite failures.

It's not Fault Tolerance

Prioritization.

5

Multiple Choice

A company is concerned with ensuring its databases are highly available.

1

Failover

2

Indexes

3

Prioritization

4

Backups

6

Failover.

Failover refers to the automatic process of switching to a secondary database server in case the primary server becomes unavailable. This ensures minimal downtime for applications that rely on the database

7

Backups are essential for recovering data in case of failures, but they don't directly address the concept of high availability.

It's not Backups

Prioritization is important in disaster recovery scenarios, but it focuses on the order of recovery for different types of data. Not keeping them available.

It's not Prioritization

Failover.

8

Multiple Choice

A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information?

1

Install and run an antivirus program.


2

Install and configure a firewall.


3

Install and use another browser.


4

Install and configure an IDS

9

Install and use another browser.

Using a modern, up-to-date browser with a good security track record significantly reduces the risk of online banking information being compromised through vulnerabilities in the outdated software. Modern browsers receive regular security updates to address newly discovered exploits.

10

A firewall can help control network traffic and block malicious connections, but it wouldn't address vulnerabilities within the outdated browser.

It's not Firewall

While an antivirus program can be helpful, it might not be enough to mitigate the risks associated with a completely outdated operating system and browser.

It's not antivirus

Install and use another browser.

11

Multiple Choice

Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?

1

Behavior security

2

Information Identity Management

3

Unauthorized hacking

4

Authorized hacking

12

Behavior Security.

This type of network security focuses on monitoring network activity for anomalies and deviations from typical patterns. It analyzes traffic for suspicious behavior that might indicate new or unknown threats. This proactive approach can help identify and stop attacks before they cause significant damage.

13

This doesn't describe a specific type of network security but rather the malicious activity that behavior security aims to detect and prevent.

It's not unauthorized hacking

This focuses on managing user access and identities within a system or network. It ensures users have the appropriate permissions

It's not IAM

Behavior Security.

14

Multiple Choice

Which of the following would allow an application to run automatically when a computer is started?


1

Services

2

Processes

3

Journaling

4

Drivers

15

Services.

Services are background programs that run continuously when the computer is started. They can be system services critical for functionality or user-added services for specific tasks.

16

These are software components that allow the operating system to interact with hardware devices. They don't directly manage application startup.

It's not Drivers...

These are instances of running programs. While some processes might be essential and start automatically, it's not a general mechanism for application startup.

It's not Processes.

Services.

17

Multiple Choice

An organization exports an inventory database nightly. This is an example of:


1

Database Backup

2

Database Import

3

Database Query

4

Database Report

18

Database Backup.

Database backup is the process of creating a copy of the database for archival or disaster recovery purposes. Exporting the inventory database nightly suggests creating a copy for safekeeping, aligning with a backup strategy.

19

Database query retrieves specific data from the database based on defined criteria. Nightly exports typically involve the entire database, not targeted data retrieval.

It's not Query...

Reports are formatted presentations of data extracted from the database, often for analysis or visualization. Exports are raw data copies, not formatted reports.

It's not Reports.

Database Backup.

20

Multiple Choice

A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:


1

Integrity concerns

2

Availability Concerns

3

Accounting concerns

4

Confidentiality concerns

21

Integrity.

Verifying the downloaded file integrity exemplifies concern about ensuring the data has not been tampered with, which aligns with integrity concerns.

22

Availability emphasizes ensuring authorized users can access data when needed. Downloading the update is necessary for availability, but verifying the hash isn't directly concerned with that aspect.

It's not Query...

Confidentiality focuses on protecting data from unauthorized access. Hashing doesn't directly address confidentiality.

It's not Confidentiality.

Integrity.

23

Review

24

Multiple Choice

What is an example of an interpreted language?

1

C++

2

Python

3

Java

4

HTML

25

Multiple Choice

A database administrator uses GRANT to grant privileges to a user.

What type of command did he use?

1

DLL

2

DML

3

DDL

4

DHL

26

Multiple Choice

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?

1

TLS

2

DLP

3

IPS

4

ACL

27

Multiple Choice

A developer needs to add a table to a database. Which of the following database activities should the user perform?

1

SELECT

2

ALTER

3

UPDATE

4

CREATE

28

Multiple Choice

Which of the following would indicate the FASTEST processor speed?

1

3.6Mbps

2

3.6Gbps

3

3.6GHz

4

3.6MHz

29

Multiple Choice

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

1

Ensure sources of EMI are removed.

2

Update from 802.11b to 802.11g.

3

Enable WPA2-Enterprise.

4

Use WiFi Protected Setup.

30

Multiple Choice

SQL databases use primary and foreign keys to enable which of the following?

1

Rows

2

Fields

3

Schemas

4

Relationships

31

Multiple Choice

Which of the following would be used to connect a user’s Cable Modem WAN connection?

1

Coax

2

RJ-11

3

RJ-45

4

USB-C

32

Multiple Choice

Which of the following allows wireless devices to communicate to a wired network?

1

Switch

2

Modem

3

Access Point

4

Router

ITF+ Most Missed Q's

media

Show answer

Auto Play

Slide 1 / 32

SLIDE