1. Which component is designed to protect against unauthorized communications to and from a computer?

module 16 17

Quiz
•
Computers
•
1st - 3rd Grade
•
Easy
Duy Hiếu
Used 37+ times
FREE Resource
66 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
security center
port scanner
antimalware
antivirus
firewall
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 10 attempts 2 within 30
RouterA(config)# login block-for 30 attempts 2 within 10
RouterA(config)# login block-for 30 attempts 10 within 2
RouterA(config)# login block-for 2 attempts 30 within 10
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What is the purpose of the network security accounting function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What type of attack may involve the use of tools such as nslookup and fping?
access attack
reconnaissance attack
denial of service attack
worm attack
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which example of malicious code would be classified as a Trojan horse?
malware that was written to look like a video game
malware that requires manual user intervention to spread between systems
malware that attaches itself to a legitimate program and spreads to other programs when launched
malware that can automatically spread from one system to another by exploiting a vulnerability in the target
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What is the difference between a virus and a worm?
Viruses self-replicate but worms do not.
Worms self-replicate but viruses do not.
Worms require a host file but viruses do not.
Viruses hide in legitimate programs but worms do not.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which attack involves a compromise of data that occurs between two end points?
denial-of-service
man-in-the-middle attack
extraction of security parameters
username enumeration
Create a free account and access millions of resources
Similar Resources on Wayground
70 questions
PAS TLJ XI

Quiz
•
1st - 5th Grade
65 questions
AWS Certified Solutions Architect - Associate (SAA-C03) - 3

Quiz
•
1st Grade
68 questions
Икт..

Quiz
•
1st - 5th Grade
65 questions
mạng máy tính

Quiz
•
1st Grade
62 questions
NEW 1.2.1 Operating Systems

Quiz
•
3rd Grade
70 questions
ZOOM MEETING/GOOGLE DRIVE

Quiz
•
1st - 5th Grade
61 questions
Teori Kejuruan TKJ

Quiz
•
1st Grade
68 questions
CC exam Jan 22

Quiz
•
1st Grade
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade