
Part 2 comptia
Authored by Breanna Norton
Other
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
78 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a review of the proxy server logs, if a user was repeatedly violating content standards and was not complying with the Acceptable Use Policy (AUP), which of the following is the MOST likely cause?
Another user was using someone else's login credentials
The system was being used to mine cryptocurrency
The user needed to access those sites for official duties
The user's computer was infected with adware
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are used to increase the computing time it takes to brute force a password using an offline attack? (Select TWO)
XOR
PBKDF2
Bcrypt
HMAC
RIPEMD
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
To determine the Annual Loss Expectancy (ALE) of a particular risk, which of the following must be calculated? (Select TWO)
ARO
ROI
SPO
SLE
RTO
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Chief Information Officer is reviewing the badging procedures and decides to write a policy that all employees must have their badges rekeyed at least annually. Which of the following controls BEST describes this policy?
Physical
Corrective
Technical
Administrative
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is looking for information about software versions on the network. Which of the following techniques is the intruder using?
Banner grabbing
Port scanning
Packet sniffing
Virus scanning
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following attackers generally possesses minimal technical knowledge to perform advanced attacks and uses widely available tools as well as publicly available information?
Hacktivist
White hat hacker
Script kiddie
Penetration tester
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is providing employees with computers that log their time based on when they sign on and off the network. Which of the following account types should the employees receive?
Shared account
Privileged account
User account
Service account
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
75 questions
Video Game Characters
Quiz
•
9th - 12th Grade
80 questions
Quiz tentang Aki dan Elektrolit
Quiz
•
12th Grade - University
81 questions
Vet Science Review
Quiz
•
9th - 12th Grade
75 questions
Trivia
Quiz
•
7th - 12th Grade
81 questions
JAG Competency Assessment Multi Year
Quiz
•
10th - 12th Grade
75 questions
AI NHANH HƠN
Quiz
•
12th Grade - University
80 questions
RAZONAMIENTO VERBAL - Sinónimos
Quiz
•
1st Grade - University
75 questions
Ch. 5 Fingerprint Test
Quiz
•
10th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Other
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
23 questions
TSI Math Vocabulary
Quiz
•
10th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
20 questions
Predicting Products
Quiz
•
9th - 12th Grade
20 questions
Presidents Day challenge
Quiz
•
9th - 12th Grade
20 questions
Food Chains and Food Webs
Quiz
•
7th - 12th Grade
20 questions
Banking
Quiz
•
9th - 12th Grade