98-367 PT3

98-367 PT3

9th - 12th Grade

35 Qs

quiz-placeholder

Similar activities

AQA GCSE Networking

AQA GCSE Networking

9th - 10th Grade

32 Qs

Bits, Bytes, and Beyond: Your Digital Defense Quiz

Bits, Bytes, and Beyond: Your Digital Defense Quiz

9th - 12th Grade

30 Qs

Administrasi Infrastruktur Jaringan (Firewall)

Administrasi Infrastruktur Jaringan (Firewall)

12th Grade

40 Qs

Year 7 Year End Quiz 1

Year 7 Year End Quiz 1

7th Grade - University

30 Qs

Cybersecurity and Global Impacts

Cybersecurity and Global Impacts

9th - 12th Grade

33 Qs

Year 7 Assessment Preparation

Year 7 Assessment Preparation

5th - 9th Grade

30 Qs

System Vulnerabilities 1

System Vulnerabilities 1

12th Grade

40 Qs

Intro to IT Pre-test

Intro to IT Pre-test

9th - 12th Grade

40 Qs

98-367 PT3

98-367 PT3

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Thomas Ray

Used 90+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two are included in an enterprise antivirus program?
On-demand scanning
Scheduled scanning
Attack surface scanning
Packet scanning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Windows Firewall protects computers from unauthorized network connections.
Email viruses
Phishing scams
Unencrypted network access
No change is needed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When conducting a security audit the first step is to:
Inventory the company's technology assets
Install auditing software on your servers
Set up the system logs to audit security events
Set up a virus quarantine area

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Setting a minimum password age restricts when users can:
Request a password reset
Change their passwords
Log on by using their passwords
Set their own password expiration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The purpose of a digital certificate is to verify that a:
Public key belongs to a sender.
Computer is virus-free.
Private key belongs to a sender.
Digital document is complete.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You create a new file in a folder that has inheritance enabled. By default, the new file:
Takes the permissions of the parent folder
Does not take any permissions
Takes the permissions of other folders in the same directory
Takes the permissions of other files in the same directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dumpster diving refers to a physical threat that a hacker might use to look for information
about a computer network.
Phishing
Malware
Reverse Social Engineering
No Change is Needed

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?