CompTIA Review #4

CompTIA Review #4

12th Grade

11 Qs

quiz-placeholder

Similar activities

Bài 6_Lớp 11_Tại lớp

Bài 6_Lớp 11_Tại lớp

12th Grade

10 Qs

Internet seguro

Internet seguro

8th Grade - University

10 Qs

Evaluación

Evaluación

12th Grade

15 Qs

Baze de date-Design

Baze de date-Design

12th Grade

10 Qs

Los periféricos del computador

Los periféricos del computador

1st Grade - Professional Development

9 Qs

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

11th - 12th Grade

10 Qs

CompTIA Review #4

CompTIA Review #4

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Jay Thapar

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following threat actors is most likely to be motivated by ideology?

Business competitor

Hacktivist

Criminal Syndicate

Disgruntled Employee

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).

System

Authentication

Error

Network

Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is auditing the manner in which its European customers’ personal information is handled. Which of the following should the company consult?

GDPR

ISO

NIST

PCIDSS

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

While troubleshooting a firewall configuration, a technician determines that a "deny any" policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?

Documenting the new policy in a change request and submitting the request to change management

Testing the policy in a non-production environment before enabling the policy in the production network

Disabling any intrusion prevention signatures on the "deny any" policy prior to enabling the new policy

Including an "allow any" policy above the "deny any" policy

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A local server recently crashed, and the team is attempting to restore the server from a backup. During the restore process, the team notices the file size of each daily backup is large and will run out of space at the current rate. The current solution appears to do a full backup every night. Which of the following would use the least amount of storage space for backups?

A weekly, incremental backup with daily differential backups

A weekly, full backup with daily snapshot backups

A weekly, full backup with daily differential backups

A weekly, full backup with daily incremental backups

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A financial institution would like to store its customer data in the cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution Is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would best meet the requirement?

Asymmetric

Symmetric

Ephemeral

Homomorphic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?

DDOS

Buffer Overflow

DNS poisoning

Privilege escalation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?