CompTIA Workshop

CompTIA Workshop

Professional Development

8 Qs

quiz-placeholder

Similar activities

DGTL CONEXN - Level 2

DGTL CONEXN - Level 2

Professional Development

10 Qs

EPSE BeNeLux 2025

EPSE BeNeLux 2025

Professional Development

10 Qs

Cyber-attacks, Domain Disputes

Cyber-attacks, Domain Disputes

Professional Development

11 Qs

Phishing - Learning Tales

Phishing - Learning Tales

Professional Development

10 Qs

P-C-D-A Knowledge Check

P-C-D-A Knowledge Check

Professional Development

10 Qs

Police Talk 2022

Police Talk 2022

Professional Development

12 Qs

AUP

AUP

Professional Development

10 Qs

NA Buy Phone TMs Calibration WB1028

NA Buy Phone TMs Calibration WB1028

Professional Development

10 Qs

CompTIA Workshop

CompTIA Workshop

Assessment

Quiz

Other

Professional Development

Hard

Created by

Dana Lorenzo

Used 4+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your organization frequently has guests visiting in various conference rooms throughout the building. These guests need access to the Internet via the wireless network, but should not be able to access internal network resources. Employees need access to both the internal network and the Internet. Which of the following would BEST meet this need?

NAT

DMZ

DMZ

802.1x

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Of the following choices, what can you use to divert malicious attacks on your network away from valuable data to worthless, fabricated data?

Intrusion Prevention System (IPS)

Intrusion Prevention System (IPS)

Honeypot

Web application firewall

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your company’s web site experiences a large number of client requests during certain times of the year.  Which of the following could your company add to ensure the web site’s availability during these times?

Load balancing

Web application firewall

Certificates

Fail-open cluster

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You work as a help-desk professional in a large organization.  You have begun to receive an extraordinary number of calls from employees related to malware.  Using common incident response procedures, which of the following should be your FIRST response?

Preparation

Identification

Eradication

Recovery

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Management within your organization has defined a use case to support confidentiality of Personally Identifiable Information stored in a database.  Which of the solutions will BEST meet this need?

Encryption

Hashing

Digital signature

Smart card

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your management has implemented a policy stating that messages sent between upper-level executives must arrive without any changes.  The IT department is tasked with implementing technical controls to meet this need.  Which security goal does this policy address?

Confidentiality

Integrity

Availability

  Authentication

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are tasked with improving the overall security for a database server.  Which of the following is a preventive control that will assist with this goal?

Disabling unnecessary services

Identifying the initial baseline configuration

Monitoring logs for trends

Monitoring logs for trends

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An outside security auditor recently completed an in-depth security audit on your network.  One of the issues he reported was related to passwords.  Specifically he found the following passwords used on the network:  Pa$$, 1@W2, and G7bT3.  Which of the following should be changed to avoid the problem shown with these passwords?

Password complexity

Password length

Password history

Password reuse