Search Header Logo

COMPTIA IT 2

Authored by Alan Rasmussen

Computers

Professional Development

Used 32+ times

COMPTIA IT 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data destruction can be caused by which of the following?

DDoS

Replay attack

Ransomware

Dumpster diving

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of RAID array does not provide protection against drive failure?

RAID 0

RAID 5

RAID 10

RAID 1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do you check volatge levels while the computer is running?

Surge suppressor

PC Health screen in BIOS

Outlet tester

VGA macro

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email claiming to be from the CEO, asking you to have the accountant wire transfer money to an offshore account. This is probably an example of which of the following?

DDoS

lack of an audit trail

Executive impersonation

Wiretapping

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are exchanging emails with someone who appears to be the IT director. THe responses to your emails do no make sense. After switching to text messaging, you determine that you and your IT director have been actually communicating with a hacker. The attack method is which of the following?

Executive impersonation

Man-in-the-middle

Replay attack

Social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While speaking with a co-worker concerning a surprise party on a standard phone, you hear a faint click. LAter, another co-worker makes a statement that implies knowledge of the party, even though no one else should know about the party yet. What is the most likely reason?

Phishing

Wiretapping

Dumpster diving

Snooping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person comes to your department and announces "I'm from the Internet provider" but doesn't show any ID. This could be an example of which of the following?

social engineering

man-in-the-middle

denial of service

replay attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?