CompTIA A+ Certification Core 2 (220-1102) - Threats

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary focus of host-based security?
Ensuring physical security
Monitoring internet traffic
Securing individual systems
Protecting the entire network
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common method to prevent man in the middle attacks?
Regular system updates
Using firewalls
Installing antivirus software
Implementing encryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spoofing involves:
Overloading a server
Impersonating another entity
Intercepting communications
Encrypting data
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can spoofing be mitigated?
Installing more RAM
Using certificates and authentication
Increasing bandwidth
Disabling cookies
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of a denial of service attack?
To steal data
To impersonate a user
To encrypt communications
To make a server unavailable
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a zero-day threat?
A type of firewall
An outdated software
A new, unseen threat
A known vulnerability
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a sign of a compromised system?
Faster boot time
Improved graphics performance
Renamed system files
Increased internet speed
Similar Resources on Wayground
2 questions
Perform a DNS Spoofing Attack

Interactive video
•
University
6 questions
A Detailed Guide to the OWASP Top 10 - Section Intro

Interactive video
•
University
6 questions
Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities

Interactive video
•
University
6 questions
Ciaran Martin outlines future of cyber security in the UK

Interactive video
•
University
8 questions
Bug Bounty Program Certification 5.1: About Network Internal Attack on Server

Interactive video
•
University
2 questions
Ciaran Martin outlines future of cyber security in the UK

Interactive video
•
University
4 questions
Bug Bounty Program Certification 5.1: About Network Internal Attack on Server

Interactive video
•
University
6 questions
Web Security: Common Vulnerabilities And Their Mitigation - You, This Course and Us

Interactive video
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade