Search Header Logo

Day 5 Core 2

Authored by Connor Hach

Computers

Professional Development

Used 3+ times

Day 5 Core 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A small business needs to ensure that its critical data is regularly backed up and that recovery can be quickly achieved if needed. They have limited storage space and want to minimize the time required for daily backups. Which backup method would be the most efficient for this purpose?

Full backup

Incremental backup

Differential backup

Synthetic backup

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization is implementing a new authentication method to enhance security for accessing its wireless network. Which authentication method provides an additional layer of security by requiring users to provide multiple forms of verification to access the network?

RADIUS

TACACS+

Kerberos

Multifactor

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An IT administrator needs to implement a reliable backup strategy for a company's critical data. The goal is to ensure data redundancy and facilitate disaster recovery. The strategy must comply with the 3-2-1 backup rule. Which of the following correctly represents the 3-2-1 backup rule?

A. Three backups on the same device, two off-site, one on-site

B. Three total copies of the data, two on different media, one off-site

C. Three total copies of the data, two on the same media, one off-site

D. Three off-site backups, two on different media, one on the cloud

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company's employees have received emails requesting sensitive information such as login credentials or financial details. What type of social-engineering attack is the company likely experiencing?

A. Vishing

B. Whaling

C. Phishing

D. Shoulder surfing

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A company is upgrading its wireless network security to enhance protection against unauthorized access. Which wireless security protocol provides stronger encryption and security compared to WPA2?

WPA2

WPA3

TKIP

AES

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An attacker gains access to a company's premises by following an authorized employee through a secure door without presenting valid credentials. What type of social-engineering attack is demonstrated in this scenario?

Whaling

Tailgating

Dumpster diving

Impersonation

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An attacker impersonates a senior executive via email and instructs an employee to transfer a large sum of money to a fraudulent account. What type of social-engineering attack is exemplified in this scenario?

Shoulder surfing

Spoofing

Evil twin

Impersonation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?