Sec+ review

Sec+ review

10th Grade - University

30 Qs

quiz-placeholder

Similar activities

C++

C++

University

25 Qs

Application Software

Application Software

University

29 Qs

Quiz on Operating System Basics

Quiz on Operating System Basics

University

25 Qs

Skawa- grafika

Skawa- grafika

5th - 10th Grade

25 Qs

2.7 System Software

2.7 System Software

12th Grade - University

25 Qs

Angular 4

Angular 4

University

25 Qs

File Organization - Information Processing Part 2

File Organization - Information Processing Part 2

5th - 12th Grade

25 Qs

Keyboard Mastery

Keyboard Mastery

10th - 11th Grade

25 Qs

Sec+ review

Sec+ review

Assessment

Quiz

Computers

10th Grade - University

Medium

Created by

Linda Lavender

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you use if you allow users to bring in an approved device?

BYOD

AUP

CYOD

COPE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Used to check the validity of a certificate?

CA

CSP

CSR

CRL

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Technique used to grab version information?

ping sweep

banner grabbing

tcpdump

phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does DLP typically detect sensitive data?

By using hash functions

By analyzing file names

By using pattern matching and fingerprinting

By scanning firewall logs

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is a secure baseline important?

It helps ensure consistent security configurations across systems

It blocks non-encrypted traffic

It replaces the need for security patchin

It prevents physical access to systems

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been authorized by management to use a vulnerability scanner once every three months. What is this tool?

an application that identifies ports and services that are at risk on a network

an application that identifies ports and services that are at risk on a network

an application that identifies security issues on a network and gives suggestions on how to prevent the issues

an application that detects when network intrusions occur and identifies the appropriate personnel

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is part of a scan to identify a common misconfiguration?

Packet sniffing

Dictionary attack

Password policy

Router with a default password

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?