Search Header Logo

Topic 2 : Exam Pool B

Authored by Denada Canaj

Computers

Professional Development

Topic 2 : Exam Pool B
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

An attacker browses a company’s online job board attempting to find any relevant information regarding the technologies the company uses.

Which of the following BEST describes this social engineering technique?

Hoax

Reconnaissance

Impersonation

Pretexting

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Server administrators want to configure a cloud solution so that computing memory and processor usage is maximized most efficiently across a number of virtual servers. They also need to avoid potential denial-of-service situations caused by availability.

Which of the following should an administrator configure to maximize system availability while efficiently utilizing available computing power?

Dynamic resource allocation

High availability

Segmentation

Container security

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following uses SAML for authentication?

TOTP

Federation

Kerberos

HOTP

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The Chief Information Security Officer (CISO) of a bank recently updated the incident response policy. The CISO is concerned that members of the incident response team do not understand their roles. The bank wants to test the policy but with the least amount of resources or impact.

Which of the following BEST meets the requirements?

Warm site failover

Tabletop walk-through

Parallel path testing

Full outage simulation

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A security analyst is reviewing web-application logs and finds the following log:

https://www.comptia.org/contact-us/93Ffiles/%3Ffile%Ffile%3D..%2F..%2F..%2Fetch%2Fpasswd

Which of the following attacks is being observed?

Directory traversal

XSS

CSRF

On-path attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?