
Day 5 Core 2

Quiz
•
Computers
•
Professional Development
•
Medium
Connor Hach
Used 3+ times
FREE Resource
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A small business needs to ensure that its critical data is regularly backed up and that recovery can be quickly achieved if needed. They have limited storage space and want to minimize the time required for daily backups. Which backup method would be the most efficient for this purpose?
Full backup
Incremental backup
Differential backup
Synthetic backup
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An organization is implementing a new authentication method to enhance security for accessing its wireless network. Which authentication method provides an additional layer of security by requiring users to provide multiple forms of verification to access the network?
RADIUS
TACACS+
Kerberos
Multifactor
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An IT administrator needs to implement a reliable backup strategy for a company's critical data. The goal is to ensure data redundancy and facilitate disaster recovery. The strategy must comply with the 3-2-1 backup rule. Which of the following correctly represents the 3-2-1 backup rule?
A. Three backups on the same device, two off-site, one on-site
B. Three total copies of the data, two on different media, one off-site
C. Three total copies of the data, two on the same media, one off-site
D. Three off-site backups, two on different media, one on the cloud
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A company's employees have received emails requesting sensitive information such as login credentials or financial details. What type of social-engineering attack is the company likely experiencing?
A. Vishing
B. Whaling
C. Phishing
D. Shoulder surfing
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A company is upgrading its wireless network security to enhance protection against unauthorized access. Which wireless security protocol provides stronger encryption and security compared to WPA2?
WPA2
WPA3
TKIP
AES
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An attacker gains access to a company's premises by following an authorized employee through a secure door without presenting valid credentials. What type of social-engineering attack is demonstrated in this scenario?
Whaling
Tailgating
Dumpster diving
Impersonation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An attacker impersonates a senior executive via email and instructs an employee to transfer a large sum of money to a fraudulent account. What type of social-engineering attack is exemplified in this scenario?
Shoulder surfing
Spoofing
Evil twin
Impersonation
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
SAA-C03 - Módulo 14

Quiz
•
Professional Development
15 questions
Administration Database

Quiz
•
University - Professi...
10 questions
Network+ Quiz 1

Quiz
•
Professional Development
10 questions
ITF - Quiz 13.4 - Software Sources and Patch Management

Quiz
•
Professional Development
15 questions
Part 3.3

Quiz
•
Professional Development
8 questions
Pre-Sales [Día 1]

Quiz
•
Professional Development
11 questions
Segurança de Redes

Quiz
•
11th Grade - Professi...
15 questions
Cyber Security Fundamentals

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade