Day 5 Core 2

Day 5 Core 2

Professional Development

12 Qs

quiz-placeholder

Similar activities

ITF - Quiz 13.4 - Software Sources and Patch Management

ITF - Quiz 13.4 - Software Sources and Patch Management

Professional Development

10 Qs

Part 3.3

Part 3.3

Professional Development

15 Qs

Pre-Sales [Día 1]

Pre-Sales [Día 1]

Professional Development

8 Qs

Segurança de Redes

Segurança de Redes

11th Grade - Professional Development

11 Qs

Administration Database

Administration Database

University - Professional Development

15 Qs

Network+ Quiz 1

Network+ Quiz 1

Professional Development

10 Qs

Veeam Quiz TDSYNNEX

Veeam Quiz TDSYNNEX

Professional Development

11 Qs

Datto Saas Multi Layer Protection

Datto Saas Multi Layer Protection

Professional Development

10 Qs

Day 5 Core 2

Day 5 Core 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Connor Hach

Used 3+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A small business needs to ensure that its critical data is regularly backed up and that recovery can be quickly achieved if needed. They have limited storage space and want to minimize the time required for daily backups. Which backup method would be the most efficient for this purpose?

Full backup

Incremental backup

Differential backup

Synthetic backup

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization is implementing a new authentication method to enhance security for accessing its wireless network. Which authentication method provides an additional layer of security by requiring users to provide multiple forms of verification to access the network?

RADIUS

TACACS+

Kerberos

Multifactor

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An IT administrator needs to implement a reliable backup strategy for a company's critical data. The goal is to ensure data redundancy and facilitate disaster recovery. The strategy must comply with the 3-2-1 backup rule. Which of the following correctly represents the 3-2-1 backup rule?

A. Three backups on the same device, two off-site, one on-site

B. Three total copies of the data, two on different media, one off-site

C. Three total copies of the data, two on the same media, one off-site

D. Three off-site backups, two on different media, one on the cloud

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company's employees have received emails requesting sensitive information such as login credentials or financial details. What type of social-engineering attack is the company likely experiencing?

A. Vishing

B. Whaling

C. Phishing

D. Shoulder surfing

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company is upgrading its wireless network security to enhance protection against unauthorized access. Which wireless security protocol provides stronger encryption and security compared to WPA2?

WPA2

WPA3

TKIP

AES

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An attacker gains access to a company's premises by following an authorized employee through a secure door without presenting valid credentials. What type of social-engineering attack is demonstrated in this scenario?

Whaling

Tailgating

Dumpster diving

Impersonation

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An attacker impersonates a senior executive via email and instructs an employee to transfer a large sum of money to a fraudulent account. What type of social-engineering attack is exemplified in this scenario?

Shoulder surfing

Spoofing

Evil twin

Impersonation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?