Sec+ review

Sec+ review

10th Grade - University

30 Qs

quiz-placeholder

Similar activities

Quiz Teori bahasa Otomata

Quiz Teori bahasa Otomata

University

25 Qs

data mining

data mining

University

30 Qs

CCC14 Chapter 4 - Spreadsheet

CCC14 Chapter 4 - Spreadsheet

University

25 Qs

1.1.1. Structure and function of the processor

1.1.1. Structure and function of the processor

12th Grade

34 Qs

Latihan-PWPB-XI RPL 1

Latihan-PWPB-XI RPL 1

1st - 10th Grade

25 Qs

GDSC FET Jain University Study Jam 106

GDSC FET Jain University Study Jam 106

University

25 Qs

Computer Pretest(Arduino)

Computer Pretest(Arduino)

12th Grade

33 Qs

Computer Pretest1(Arduino Grade8_t1)

Computer Pretest1(Arduino Grade8_t1)

3rd Grade - University

25 Qs

Sec+ review

Sec+ review

Assessment

Quiz

Computers

10th Grade - University

Medium

Created by

Linda Lavender

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you use if you allow users to bring in an approved device?

BYOD

AUP

CYOD

COPE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Used to check the validity of a certificate?

CA

CSP

CSR

CRL

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technique used to grab version information?

ping sweep

banner grabbing

tcpdump

phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does DLP typically detect sensitive data?

By using hash functions

By analyzing file names

By using pattern matching and fingerprinting

By scanning firewall logs

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is a secure baseline important?

It helps ensure consistent security configurations across systems

It blocks non-encrypted traffic

It replaces the need for security patchin

It prevents physical access to systems

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been authorized by management to use a vulnerability scanner once every three months. What is this tool?

an application that identifies ports and services that are at risk on a network

an application that identifies ports and services that are at risk on a network

an application that identifies security issues on a network and gives suggestions on how to prevent the issues

an application that detects when network intrusions occur and identifies the appropriate personnel

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is part of a scan to identify a common misconfiguration?

Packet sniffing

Dictionary attack

Password policy

Router with a default password

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers