Search Header Logo

Part 2 comptia

Authored by Breanna Norton

Other

12th Grade

Used 4+ times

Part 2 comptia
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

78 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a review of the proxy server logs, if a user was repeatedly violating content standards and was not complying with the Acceptable Use Policy (AUP), which of the following is the MOST likely cause?

Another user was using someone else's login credentials

The system was being used to mine cryptocurrency

The user needed to access those sites for official duties

The user's computer was infected with adware

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are used to increase the computing time it takes to brute force a password using an offline attack? (Select TWO)

XOR

PBKDF2

Bcrypt

HMAC

RIPEMD

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

To determine the Annual Loss Expectancy (ALE) of a particular risk, which of the following must be calculated? (Select TWO)

ARO

ROI

SPO

SLE

RTO

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Chief Information Officer is reviewing the badging procedures and decides to write a policy that all employees must have their badges rekeyed at least annually. Which of the following controls BEST describes this policy?

Physical

Corrective

Technical

Administrative

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is looking for information about software versions on the network. Which of the following techniques is the intruder using?

Banner grabbing

Port scanning

Packet sniffing

Virus scanning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attackers generally possesses minimal technical knowledge to perform advanced attacks and uses widely available tools as well as publicly available information?

Hacktivist

White hat hacker

Script kiddie

Penetration tester

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is providing employees with computers that log their time based on when they sign on and off the network. Which of the following account types should the employees receive?

Shared account

Privileged account

User account

Service account

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?