98-367 PT3

98-367 PT3

9th - 12th Grade

35 Qs

quiz-placeholder

Similar activities

Cyber II | M4 L3: Access Control Models by Mr. B

Cyber II | M4 L3: Access Control Models by Mr. B

12th Grade

36 Qs

Cybersecurity Formative Assessment

Cybersecurity Formative Assessment

12th Grade - University

34 Qs

AQA Computer Science GCSE - 3.5 Computer networks

AQA Computer Science GCSE - 3.5 Computer networks

10th - 12th Grade

39 Qs

MTA - Windows Operating System

MTA - Windows Operating System

9th - 12th Grade

37 Qs

Year 7 Computer Science Baseline

Year 7 Computer Science Baseline

KG - Professional Development

31 Qs

J277 Networks

J277 Networks

12th Grade

34 Qs

Summative Test - Network Security

Summative Test - Network Security

10th Grade

40 Qs

IDAM and Network Architecture

IDAM and Network Architecture

11th Grade

30 Qs

98-367 PT3

98-367 PT3

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Thomas Ray

Used 90+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two are included in an enterprise antivirus program?
On-demand scanning
Scheduled scanning
Attack surface scanning
Packet scanning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Windows Firewall protects computers from unauthorized network connections.
Email viruses
Phishing scams
Unencrypted network access
No change is needed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When conducting a security audit the first step is to:
Inventory the company's technology assets
Install auditing software on your servers
Set up the system logs to audit security events
Set up a virus quarantine area

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Setting a minimum password age restricts when users can:
Request a password reset
Change their passwords
Log on by using their passwords
Set their own password expiration

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The purpose of a digital certificate is to verify that a:
Public key belongs to a sender.
Computer is virus-free.
Private key belongs to a sender.
Digital document is complete.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You create a new file in a folder that has inheritance enabled. By default, the new file:
Takes the permissions of the parent folder
Does not take any permissions
Takes the permissions of other folders in the same directory
Takes the permissions of other files in the same directory

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dumpster diving refers to a physical threat that a hacker might use to look for information
about a computer network.
Phishing
Malware
Reverse Social Engineering
No Change is Needed

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?