MTA Security Fundamentals Practice 1

MTA Security Fundamentals Practice 1

10th Grade - Professional Development

21 Qs

quiz-placeholder

Similar activities

Mechanics - Reading and Writing Skills 2022

Mechanics - Reading and Writing Skills 2022

11th Grade

20 Qs

Nickelodeon

Nickelodeon

8th - 12th Grade

20 Qs

Encanto Quiz

Encanto Quiz

Professional Development

17 Qs

วาเลนไทน์สดใส ลูก พ.น ห่างไกลโควิท 19

วาเลนไทน์สดใส ลูก พ.น ห่างไกลโควิท 19

6th - 12th Grade

20 Qs

Your plane crashed can you survive??.

Your plane crashed can you survive??.

1st - 12th Grade

17 Qs

Pastry Quiz

Pastry Quiz

9th - 10th Grade

20 Qs

Kitchen and Food Sanitation

Kitchen and Food Sanitation

9th - 12th Grade

23 Qs

MTA Security Fundamentals Practice 1

MTA Security Fundamentals Practice 1

Assessment

Quiz

Life Skills

10th Grade - Professional Development

Practice Problem

Medium

Created by

Ms. Nennig

Used 350+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To which part of the CIA triangle does "Encrypt a nonvolatile storage unit" apply?

Authority

Availability

Integrity

Confidentiality

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two types of attacks are at least some what thwarted with the use of the account lockout policy?

Dictionary attack

Brute Force attack

Denial-of-Service attack

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a benefit of the SmartScreen Filter built into the Internet Explorer and Microsoft Edge?

Firewall protection

Protection from sniffers

Perimeter network protection

Phishing protection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be allowed only on email servers used to send email and should be blocked on all other servers and client machines?

POP3

FTP

SMTP

IMAP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital certificates are electronic documents that contain an identity as a user name or organization, along with ________________

Anti-spam verification

A public key

Validating that the computer has malware protection

A primary key

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Several users have called the help desk to complain that they are being redirected to websites different from the addresses they entered. Which type of attack is taking place?

IP spoofing

ARP spoofing

DNS spoofing

Man-in-the-middle

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once it has been determined what will be audited and where the audit files will be stored, what should be taken into consideration next?

How large the log files will be

When syslog will be used

Who has access to the logs

What ticketing system will be used for the logs

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?