module 16 17

module 16 17

1st - 3rd Grade

66 Qs

quiz-placeholder

Similar activities

TIK IX GANJIL (2019/2020) Abdul Salam, ST., M. Pd

TIK IX GANJIL (2019/2020) Abdul Salam, ST., M. Pd

3rd Grade

62 Qs

Wired and Wireless Networks

Wired and Wireless Networks

2nd - 6th Grade

66 Qs

February Computer Exam

February Computer Exam

3rd Grade

65 Qs

COMPUTER

COMPUTER

3rd - 4th Grade

71 Qs

Ulangan Harian

Ulangan Harian

1st Grade

63 Qs

LO1 Unit 1 Camb Tech

LO1 Unit 1 Camb Tech

1st Grade - University

71 Qs

TES PAS INF SUSULAN

TES PAS INF SUSULAN

1st - 5th Grade

71 Qs

Administrasi Sistem Jaringan Quiz

Administrasi Sistem Jaringan Quiz

2nd Grade

66 Qs

module 16 17

module 16 17

Assessment

Quiz

Computers

1st - 3rd Grade

Easy

Created by

Duy Hiếu

Used 37+ times

FREE Resource

66 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

1. Which component is designed to protect against unauthorized communications to and from a computer?

security center

port scanner

antimalware

antivirus

firewall

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 10 attempts 2 within 30

RouterA(config)# login block-for 30 attempts 2 within 10

RouterA(config)# login block-for 30 attempts 10 within 2

RouterA(config)# login block-for 2 attempts 30 within 10

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the purpose of the network security accounting function?

to require users to prove who they are

to determine which resources a user can access

to keep track of the actions of a user

to provide challenge and response questions

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of attack may involve the use of tools such as nslookup and fping?

access attack

reconnaissance attack

denial of service attack

worm attack

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which example of malicious code would be classified as a Trojan horse?

malware that was written to look like a video game

malware that requires manual user intervention to spread between systems

malware that attaches itself to a legitimate program and spreads to other programs when launched

malware that can automatically spread from one system to another by exploiting a vulnerability in the target

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the difference between a virus and a worm?

Viruses self-replicate but worms do not.

Worms self-replicate but viruses do not.

Worms require a host file but viruses do not.

Viruses hide in legitimate programs but worms do not.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which attack involves a compromise of data that occurs between two end points?

denial-of-service

man-in-the-middle attack

extraction of security parameters

username enumeration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?