Search Header Logo

Protecting Host Systems

Authored by Ms. Nennig

Computers

11th Grade - Professional Development

Used 12+ times

Protecting Host Systems
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Something identified as harmful when it really is not

false positive

false negative

botnet

attack surface

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Loosely connected network of infected computers that are being managed by an unknown host

botnet

Russia

daemon

intrusive scan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A means of documenting issues and their solutions

baseline

auditing

event logging

change management system

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Policies set on computers and users that control system privileges

group policy

change management system

botnet

ITAM

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A function of the operating system or an application that records events or situations in a file

event logging

ITAM

change-management system

auditing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scanner uses appropriate authentication to provide accurate and comprehensive feedback

credentialed scan

botnet

authentication method

attack surface

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Starting point from which comparisons can be made

baseline

home plate

baseketball

credentialed scan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?