Search Header Logo
Network + - Domain 4 - Review 1

Network + - Domain 4 - Review 1

Assessment

Presentation

Information Technology (IT)

University

Practice Problem

Easy

Created by

Alexandra Osler

Used 1+ times

FREE Resource

10 Slides • 8 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

media

8

media

9

media

10

media

11

Multiple Choice

Which of the following is used to provide encryption and authentication services to users?

1

Honeypot

2

VLAN

3

Certificates

4

MAC flooding

12

Multiple Choice

Which of the following is the BEST solution to segment a BYOD device from others on a network?

1

VLAN

2

SAML

3

Certificate

4

DHCP

13

Multiple Choice

A company is using a decoy system to attract attackers. What is this an example of?

1

RBAC

2

Evil Twin

3

MAC flooding

4

Honeypot

14

Multiple Choice

A company is using an entire simulated environment to trap and study attackers. What is this an example of?

1
Firewall
2
Intrusion Detection System
3
Virtual Private Network
4

Honeynet

15

Multiple Choice

An attacker sets up a rogue access point with the same SSID as a legitimate one. What type of attack is this?

1
Man-in-the-Middle Attack
2
Phishing Attack
3
Rogue DHCP Server Attack
4
Evil Twin Attack

16

Multiple Choice

An attacker is able to intercept communication between two endpoints. What kind of attack is this

1

On-Path attack

2
SQL Injection attack
3
Denial of Service attack
4
Phishing attack

17

Multiple Choice

Which of the following authentication methods allows multiple systems to use one login?

1

SSO

2

TFA

3

RBAC

4

MFA

18

Multiple Choice

What type of authentication is used to gain access to a computer based on a temporary code that expires after 60 seconds?

1

Time-based authentication

2
SMS-based verification
3
Biometric authentication
4
Password-based authentication
media

Show answer

Auto Play

Slide 1 / 18

SLIDE