Part 2 comptia

Part 2 comptia

12th Grade

78 Qs

quiz-placeholder

Similar activities

Unit 1 Troubleshooting Methodology and Hardware Basics

Unit 1 Troubleshooting Methodology and Hardware Basics

9th - 12th Grade

80 Qs

SOSHUM JANUARI

SOSHUM JANUARI

12th Grade - University

75 Qs

FIL 1- Ang Panitikan ng Pilipinas - Mahabang Pagsusulit (MIDTERM)

FIL 1- Ang Panitikan ng Pilipinas - Mahabang Pagsusulit (MIDTERM)

12th Grade - University

75 Qs

đề cương tin 11 kì 1

đề cương tin 11 kì 1

9th - 12th Grade

78 Qs

3rd Quarter Reviewer

3rd Quarter Reviewer

7th Grade - University

76 Qs

LAT SOAL PSTS B.INDO SEMESTER  1

LAT SOAL PSTS B.INDO SEMESTER 1

12th Grade - University

80 Qs

Word Within The Word Lists 1-3

Word Within The Word Lists 1-3

3rd Grade - University

75 Qs

Part 2 comptia

Part 2 comptia

Assessment

Quiz

Other

12th Grade

Medium

Created by

Breanna Norton

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

78 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a review of the proxy server logs, if a user was repeatedly violating content standards and was not complying with the Acceptable Use Policy (AUP), which of the following is the MOST likely cause?

Another user was using someone else's login credentials

The system was being used to mine cryptocurrency

The user needed to access those sites for official duties

The user's computer was infected with adware

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are used to increase the computing time it takes to brute force a password using an offline attack? (Select TWO)

XOR

PBKDF2

Bcrypt

HMAC

RIPEMD

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

To determine the Annual Loss Expectancy (ALE) of a particular risk, which of the following must be calculated? (Select TWO)

ARO

ROI

SPO

SLE

RTO

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Chief Information Officer is reviewing the badging procedures and decides to write a policy that all employees must have their badges rekeyed at least annually. Which of the following controls BEST describes this policy?

Physical

Corrective

Technical

Administrative

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is looking for information about software versions on the network. Which of the following techniques is the intruder using?

Banner grabbing

Port scanning

Packet sniffing

Virus scanning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attackers generally possesses minimal technical knowledge to perform advanced attacks and uses widely available tools as well as publicly available information?

Hacktivist

White hat hacker

Script kiddie

Penetration tester

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is providing employees with computers that log their time based on when they sign on and off the network. Which of the following account types should the employees receive?

Shared account

Privileged account

User account

Service account

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?