
Day 5 Core 2
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Medium
Connor Hach
Used 3+ times
FREE Resource
Enhance your content in a minute
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A small business needs to ensure that its critical data is regularly backed up and that recovery can be quickly achieved if needed. They have limited storage space and want to minimize the time required for daily backups. Which backup method would be the most efficient for this purpose?
Full backup
Incremental backup
Differential backup
Synthetic backup
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An organization is implementing a new authentication method to enhance security for accessing its wireless network. Which authentication method provides an additional layer of security by requiring users to provide multiple forms of verification to access the network?
RADIUS
TACACS+
Kerberos
Multifactor
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An IT administrator needs to implement a reliable backup strategy for a company's critical data. The goal is to ensure data redundancy and facilitate disaster recovery. The strategy must comply with the 3-2-1 backup rule. Which of the following correctly represents the 3-2-1 backup rule?
A. Three backups on the same device, two off-site, one on-site
B. Three total copies of the data, two on different media, one off-site
C. Three total copies of the data, two on the same media, one off-site
D. Three off-site backups, two on different media, one on the cloud
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A company's employees have received emails requesting sensitive information such as login credentials or financial details. What type of social-engineering attack is the company likely experiencing?
A. Vishing
B. Whaling
C. Phishing
D. Shoulder surfing
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A company is upgrading its wireless network security to enhance protection against unauthorized access. Which wireless security protocol provides stronger encryption and security compared to WPA2?
WPA2
WPA3
TKIP
AES
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An attacker gains access to a company's premises by following an authorized employee through a secure door without presenting valid credentials. What type of social-engineering attack is demonstrated in this scenario?
Whaling
Tailgating
Dumpster diving
Impersonation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An attacker impersonates a senior executive via email and instructs an employee to transfer a large sum of money to a fraudulent account. What type of social-engineering attack is exemplified in this scenario?
Shoulder surfing
Spoofing
Evil twin
Impersonation
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
UDC 2022
Quiz
•
Professional Development
10 questions
Mastering KineMaster
Quiz
•
Professional Development
10 questions
Presentador EMAZE
Quiz
•
Professional Development
10 questions
Introducción a Excel
Quiz
•
Professional Development
11 questions
KOE034: Sensors and Instruments
Quiz
•
Professional Development
10 questions
Seguridad Informática
Quiz
•
5th Grade - Professio...
10 questions
Cloud computing 2
Quiz
•
Professional Development
10 questions
Maintain Files and Folders
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Forest Self-Management
Lesson
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
30 questions
Thanksgiving Trivia
Quiz
•
9th - 12th Grade
30 questions
Thanksgiving Trivia
Quiz
•
6th Grade
11 questions
Would You Rather - Thanksgiving
Lesson
•
KG - 12th Grade
48 questions
The Eagle Way
Quiz
•
6th Grade
10 questions
Identifying equations
Quiz
•
KG - University
10 questions
Thanksgiving
Lesson
•
5th - 7th Grade
