Search Header Logo

Net security Test 2

Computers

University

Used 4+ times

Net security Test 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In what type of cloud computing does the customer have the highest level of control?

Infrastructure as a Service (IaaS)
Infrastructure as a System (IaaS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital signatures actually only show that the public key labeled as belonging to the person was used to encrypt the digital signature. 

True
False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An evil twin AP is an AP that is set up by an attacker to mimic an authorized AP​, with the intent to redirect client devices. 

False
True

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) ____________________ trust model can be used in an organization where one CA is responsible for only the digital certificates for that organization.

hierarchical
highest

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Piconets in which connections exist between different piconets are known as a:

broadnet
honeynet
boundnet
scatternet

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the SSH suite, the ____________________ command allows a user to log on to a remote computer. 

slogin
login

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?

subnets
IP address
VLAN
MAC address

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?