
Block 4 Unit 1 Part 5 Review
Authored by Nicholas Raynes
Computers
Professional Development
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why might a network have substandard security?
The administrator doesn't have any experience and is trying to mimic his home network.
The security guards are asleep
The network interface card is bad
The router is not configured with 802.1X security
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why would a network be hacked?
Because the network contains information in the form of data that is valuable to the attacker
Because Summers really likes hacking the government
Because networks have a giant "Hack me" .txt file written on them.
Because of some reason
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common vulnerability with Wireless networks that results from extended broadcast ranges?
No physical boundaries
Overlooking physical security
Man-in-the-middle attacks
Leaving end-user devices vulnerable
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is overlooking physical security?
Not employing physical security such as guards or mantraps.
Not allowing an attacker in because he is an unwelcome guest
Putting a router in your network where it doesn't belong
Not adding security measures such as encryption in a network
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Leaving end-user devices vulnerable?
Watching Clarke in his natural habitat, studying.
Allowing virus's to have a pathway into your network through end user devices
Meyers is watching
Connecting users through remote connections to the desktop
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What occurs during a Man-in-the-middle attack?
An attacker is able to intercept and view then forward data packets
An attacker is able to destroy files from inside the company
An attacker gains access to the network through the TCP port 3389 RDP
Nothing happens
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the five distinct classes of network attacks?
Passive
Active
Close-in
Insider
Distribution
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?