Block 4 Unit 1 Part 5 Review

Block 4 Unit 1 Part 5 Review

Professional Development

27 Qs

quiz-placeholder

Similar activities

LA2 BAH 3&4

LA2 BAH 3&4

KG - Professional Development

28 Qs

ICEBERG_Assessment_Pre

ICEBERG_Assessment_Pre

University - Professional Development

23 Qs

Comptia Security+ Understanding Application Attacks and security

Comptia Security+ Understanding Application Attacks and security

Professional Development

30 Qs

Advanced Troubleshooting

Advanced Troubleshooting

Professional Development

23 Qs

Sec+ - 10A - Implement Endpoint Security

Sec+ - 10A - Implement Endpoint Security

Professional Development

26 Qs

Day 4 - Security I - Day 3 Review - 1st Review

Day 4 - Security I - Day 3 Review - 1st Review

Professional Development

22 Qs

A+ - 16D -  Summarize Security Measures

A+ - 16D - Summarize Security Measures

Professional Development

22 Qs

Cyber Security (Cyber security KS4 1-3)

Cyber Security (Cyber security KS4 1-3)

9th Grade - Professional Development

28 Qs

Block 4 Unit 1 Part 5 Review

Block 4 Unit 1 Part 5 Review

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Nicholas Raynes

Used 14+ times

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might a network have substandard security?

The administrator doesn't have any experience and is trying to mimic his home network.

The security guards are asleep

The network interface card is bad

The router is not configured with 802.1X security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would a network be hacked?

Because the network contains information in the form of data that is valuable to the attacker

Because Summers really likes hacking the government

Because networks have a giant "Hack me" .txt file written on them.

Because of some reason

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common vulnerability with Wireless networks that results from extended broadcast ranges?

No physical boundaries

Overlooking physical security

Man-in-the-middle attacks

Leaving end-user devices vulnerable

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is overlooking physical security?

Not employing physical security such as guards or mantraps.

Not allowing an attacker in because he is an unwelcome guest

Putting a router in your network where it doesn't belong

Not adding security measures such as encryption in a network

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Leaving end-user devices vulnerable?

Watching Clarke in his natural habitat, studying.

Allowing virus's to have a pathway into your network through end user devices

Meyers is watching

Connecting users through remote connections to the desktop

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What occurs during a Man-in-the-middle attack?

An attacker is able to intercept and view then forward data packets

An attacker is able to destroy files from inside the company

An attacker gains access to the network through the TCP port 3389 RDP

Nothing happens

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the five distinct classes of network attacks?

Passive

Active

Close-in

Insider

Distribution

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?