Security+ Ch 7

Security+ Ch 7

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

ICT S120 (Prelim Review)

ICT S120 (Prelim Review)

11th Grade

15 Qs

End of unit assessment - Networks

End of unit assessment - Networks

9th Grade

18 Qs

JAVA method

JAVA method

12th Grade

21 Qs

Text and Image representation

Text and Image representation

11th Grade

22 Qs

Diagnóstico 1er Cuatrimestre - IA II

Diagnóstico 1er Cuatrimestre - IA II

12th Grade

17 Qs

4th Quarter SketchUp Review

4th Quarter SketchUp Review

10th Grade

15 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

20 Qs

Computer Fundamentals

Computer Fundamentals

10th Grade

20 Qs

Security+ Ch 7

Security+ Ch 7

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Terry Nguyen

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following TCP/IP protocols do not relate to security?

IP

SNMP

HTTPS

FTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?

It is fully supported in BIND9
It adds additional resource records
It adds message header information
It can prevent a DNS transfer attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the recommended secure protocol for voice and video applications?

Secure Real-time Transport Protocol (SRTP)
Hypertext Transport Protocol Secure (HTTPS)
Network Time Protocol (NTP)
Secure/Multipurpose Internet Mail Extensions (S/MIME)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of log can provide details regarding requests for specific files on a system?

Audit log
Access log
Event log
SysFile log

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of device log contains the most beneficial security data?

Firewall log
Email log
Switch log
Router log

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cloud is offered to specific organizations that have common concerns?

Public cloud
Hybrid cloud
Private cloud
Community cloud

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT correct about an SSL accelerator?

It is a separate hardware card that inserts into a webserver
It contains one or more co-processors to handle SSL/TLS processing
It can be installed as a "virtual SSL/TLS server" alongside a forward proxy server
It replaces FTP using Secure Sockets Layer (FTPS) as a file transport layer resting "on top" of SSL/TLS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?