Search Header Logo

CompTIA Review #4

Authored by Jay Thapar

Computers

12th Grade

Used 3+ times

CompTIA Review #4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following threat actors is most likely to be motivated by ideology?

Business competitor

Hacktivist

Criminal Syndicate

Disgruntled Employee

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).

System

Authentication

Error

Network

Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is auditing the manner in which its European customers’ personal information is handled. Which of the following should the company consult?

GDPR

ISO

NIST

PCIDSS

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

While troubleshooting a firewall configuration, a technician determines that a "deny any" policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?

Documenting the new policy in a change request and submitting the request to change management

Testing the policy in a non-production environment before enabling the policy in the production network

Disabling any intrusion prevention signatures on the "deny any" policy prior to enabling the new policy

Including an "allow any" policy above the "deny any" policy

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A local server recently crashed, and the team is attempting to restore the server from a backup. During the restore process, the team notices the file size of each daily backup is large and will run out of space at the current rate. The current solution appears to do a full backup every night. Which of the following would use the least amount of storage space for backups?

A weekly, incremental backup with daily differential backups

A weekly, full backup with daily snapshot backups

A weekly, full backup with daily differential backups

A weekly, full backup with daily incremental backups

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A financial institution would like to store its customer data in the cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution Is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would best meet the requirement?

Asymmetric

Symmetric

Ephemeral

Homomorphic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?

DDOS

Buffer Overflow

DNS poisoning

Privilege escalation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?