CY2U16 Test Review

CY2U16 Test Review

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

q3 css (app)

q3 css (app)

12th Grade

10 Qs

Networking Chapter 2

Networking Chapter 2

9th - 12th Grade

15 Qs

BTEC DIT C3 LAB - Device Hardening & Encryption

BTEC DIT C3 LAB - Device Hardening & Encryption

10th - 11th Grade

10 Qs

CompTIA A+February27

CompTIA A+February27

11th Grade

11 Qs

Network Security Quiz Chapter 4 SY23/24

Network Security Quiz Chapter 4 SY23/24

11th Grade

10 Qs

Dante Level 1 - Chapter 6 - Dante Ports & Connections

Dante Level 1 - Chapter 6 - Dante Ports & Connections

12th Grade

11 Qs

Network Devices

Network Devices

12th Grade

10 Qs

Cisco 2, Module 10

Cisco 2, Module 10

12th Grade

15 Qs

CY2U16 Test Review

CY2U16 Test Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

CCRE UAH

Used 42+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Taking steps to reduce the impact of a cyber attack before it happens is called what?

Cyber Preventative Solutions

Business Continuity Plan

Cyber Mitigation Techniques

Disaster Prevention Plan

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Dividing a network into segments to control the network traffic flowing into an area is what?

Spanning Tree Protocol

Switch Port Protection

Network Segmentation

VLAN

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Choose all of the following that are examples of device hardening.

Updating firmware

Disabling Unused Ports

File Integrity Monitoring

Network segmentation

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

In order to check the validity of a website before entering personally identifiable information, you should check for the __________________________.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________________ is the process of applying a mathematical computation to a word or words to make a message difficult to read.

Hashing

Digital Signature

Decryption

Certificate of Authority

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of switch port protection?

Netstat

Secure Socket Layer Security

Flood Guard

Digital Signature

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a primary tool used by hackers to access a network?

Prior-Knowledge

Expertise

Money

Time

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?