CompTIA Review #4

CompTIA Review #4

12th Grade

11 Qs

quiz-placeholder

Similar activities

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

Understanding RAID Concepts and Levels

Understanding RAID Concepts and Levels

10th Grade - University

15 Qs

Backups

Backups

9th - 12th Grade

14 Qs

Unit 11 - Physical Security

Unit 11 - Physical Security

11th - 12th Grade

10 Qs

Network Architecture

Network Architecture

12th Grade - University

8 Qs

AS: Archiving, Backup - Full and Differential

AS: Archiving, Backup - Full and Differential

12th Grade - University

13 Qs

BTEC National ICT - U1 LAA Software 5

BTEC National ICT - U1 LAA Software 5

12th Grade

10 Qs

Ctech Unit 2 1.3 Video Qs

Ctech Unit 2 1.3 Video Qs

12th Grade

10 Qs

CompTIA Review #4

CompTIA Review #4

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Jay Thapar

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following threat actors is most likely to be motivated by ideology?

Business competitor

Hacktivist

Criminal Syndicate

Disgruntled Employee

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).

System

Authentication

Error

Network

Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is auditing the manner in which its European customers’ personal information is handled. Which of the following should the company consult?

GDPR

ISO

NIST

PCIDSS

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

While troubleshooting a firewall configuration, a technician determines that a "deny any" policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?

Documenting the new policy in a change request and submitting the request to change management

Testing the policy in a non-production environment before enabling the policy in the production network

Disabling any intrusion prevention signatures on the "deny any" policy prior to enabling the new policy

Including an "allow any" policy above the "deny any" policy

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A local server recently crashed, and the team is attempting to restore the server from a backup. During the restore process, the team notices the file size of each daily backup is large and will run out of space at the current rate. The current solution appears to do a full backup every night. Which of the following would use the least amount of storage space for backups?

A weekly, incremental backup with daily differential backups

A weekly, full backup with daily snapshot backups

A weekly, full backup with daily differential backups

A weekly, full backup with daily incremental backups

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A financial institution would like to store its customer data in the cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution Is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would best meet the requirement?

Asymmetric

Symmetric

Ephemeral

Homomorphic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?

DDOS

Buffer Overflow

DNS poisoning

Privilege escalation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?