Search Header Logo

Block 4 Unit 1 Part 5 Review

Authored by Nicholas Raynes

Computers

Professional Development

Used 14+ times

Block 4 Unit 1 Part 5 Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might a network have substandard security?

The administrator doesn't have any experience and is trying to mimic his home network.

The security guards are asleep

The network interface card is bad

The router is not configured with 802.1X security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would a network be hacked?

Because the network contains information in the form of data that is valuable to the attacker

Because Summers really likes hacking the government

Because networks have a giant "Hack me" .txt file written on them.

Because of some reason

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common vulnerability with Wireless networks that results from extended broadcast ranges?

No physical boundaries

Overlooking physical security

Man-in-the-middle attacks

Leaving end-user devices vulnerable

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is overlooking physical security?

Not employing physical security such as guards or mantraps.

Not allowing an attacker in because he is an unwelcome guest

Putting a router in your network where it doesn't belong

Not adding security measures such as encryption in a network

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Leaving end-user devices vulnerable?

Watching Clarke in his natural habitat, studying.

Allowing virus's to have a pathway into your network through end user devices

Meyers is watching

Connecting users through remote connections to the desktop

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What occurs during a Man-in-the-middle attack?

An attacker is able to intercept and view then forward data packets

An attacker is able to destroy files from inside the company

An attacker gains access to the network through the TCP port 3389 RDP

Nothing happens

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the five distinct classes of network attacks?

Passive

Active

Close-in

Insider

Distribution

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?