COMPTIA IT 2

COMPTIA IT 2

Professional Development

50 Qs

quiz-placeholder

Similar activities

Computer Hardware and Software - Networking

Computer Hardware and Software - Networking

Professional Development

50 Qs

Java Collections Trivia

Java Collections Trivia

Professional Development

45 Qs

104 Review

104 Review

10th Grade - Professional Development

53 Qs

Sistemas Informáticos 2ºT (8 y 9)

Sistemas Informáticos 2ºT (8 y 9)

Professional Development

48 Qs

Java Array

Java Array

Professional Development

55 Qs

Security+ Authentication Design Concepts

Security+ Authentication Design Concepts

Professional Development

50 Qs

Microsoft Azure Fundamentals AZ-900 ENG #6

Microsoft Azure Fundamentals AZ-900 ENG #6

University - Professional Development

50 Qs

IT Security ICDL

IT Security ICDL

Professional Development

50 Qs

COMPTIA IT 2

COMPTIA IT 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Alan Rasmussen

Used 32+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data destruction can be caused by which of the following?

DDoS

Replay attack

Ransomware

Dumpster diving

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of RAID array does not provide protection against drive failure?

RAID 0

RAID 5

RAID 10

RAID 1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do you check volatge levels while the computer is running?

Surge suppressor

PC Health screen in BIOS

Outlet tester

VGA macro

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email claiming to be from the CEO, asking you to have the accountant wire transfer money to an offshore account. This is probably an example of which of the following?

DDoS

lack of an audit trail

Executive impersonation

Wiretapping

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are exchanging emails with someone who appears to be the IT director. THe responses to your emails do no make sense. After switching to text messaging, you determine that you and your IT director have been actually communicating with a hacker. The attack method is which of the following?

Executive impersonation

Man-in-the-middle

Replay attack

Social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While speaking with a co-worker concerning a surprise party on a standard phone, you hear a faint click. LAter, another co-worker makes a statement that implies knowledge of the party, even though no one else should know about the party yet. What is the most likely reason?

Phishing

Wiretapping

Dumpster diving

Snooping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person comes to your department and announces "I'm from the Internet provider" but doesn't show any ID. This could be an example of which of the following?

social engineering

man-in-the-middle

denial of service

replay attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?