Search Header Logo

MTA 98-367 and Port Numbers

Professional Development

Used 60+ times

MTA 98-367 and Port Numbers
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

150 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of malware can copy itself and infect a computer without the user's consent or knowledge?

Virus

Rootkit

Trojan Horse

Backdoor

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following terms indicates that information is to be read only by those people for whom it is intended?

confidentiality

integrity

availability

accounting

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What technology is not used to implement confidentiality?

encryption

access control

auditing

authentication

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following makes sure that data is not changed when it not supposed to be?

confidentiality

integrity

availability

accounting

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is not a response when dealing with a risk?

avoidance

mitigation

transfer

patching

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What do you call the security discipline that requires that a user is given no more privilege necessary to perform his or her job?

defense in depth

reduction of attack surface

risk transfer

principle of least privilege

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What do you call the scope that hacker can use to break into a system?

defense in depth

attack surface

principle of least privilege

risk mitigation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?