Search Header Logo

BCS Network Security Test 7

Authored by Chris Whitehead

Professional Development, Education, Instructional Technology

University - Professional Development

Used 233+ times

BCS Network Security Test 7
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of self-replicating program copies to other computers on a network without any user intervention and consumes bandwith and computer resources?

Virus

Trojan Horse

Worm

backdoor

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of attack tries to guess passwords by every combination of characters?

dictionary attack

brute-force attack

man-in-the-middle attack

smurf attack

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of firewall is also known as a proxy server?

application-level

circuit-filtering

packet-filtering

stateful

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What technology can you use to isolate a network of servers so that they cannot interact with other servers?

bridge

switch

router

VLAN

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the standard or basic collection of NTFS permissions?

Read and execute, read, write, full control, modify, list folder contents

Change permissions, read permissions, write permissions

Read attributes, list folder/read data, traverse folder/execute file

Create files/write data, create folders/append data, take ownership

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The primary purpose of Network Access Protection (NAP) is to prevent:

Loss of data from client computers on a network.

Non-compliant systems from connecting to a network.

Users on a network from installing software.

Unauthorized users from accessing a network.

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

The company that you work for wants to set up a secure network, but they do not have any servers. Which three security methods require the use of a server? (Choose three.)

802.1x

WPA2 Personal

WPA2 Enterprise

RADIUS

802.11ac

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development