Day 10 - Networking & Security I - Day 10 - 2nd Review

Day 10 - Networking & Security I - Day 10 - 2nd Review

University

20 Qs

quiz-placeholder

Similar activities

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

Cisco LAN Security Concepts

Cisco LAN Security Concepts

University

22 Qs

Week 12 - Module 5 Unit 3 Using Access Control

Week 12 - Module 5 Unit 3 Using Access Control

University

20 Qs

DSP-Minor1

DSP-Minor1

University

20 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

Week 11 Quiz 2

Week 11 Quiz 2

10th Grade - University

20 Qs

IAS Finals Reviewer

IAS Finals Reviewer

University

24 Qs

AAA Security and Access Management Quiz

AAA Security and Access Management Quiz

11th Grade - University

15 Qs

Day 10 - Networking & Security I - Day 10 - 2nd Review

Day 10 - Networking & Security I - Day 10 - 2nd Review

Assessment

Quiz

Computers

University

Medium

Created by

Rehan Ahmed

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the theme topic of Day 10 for N&S I?

Network Operations

Network Troubleshooting

Network Security Fundamentals

TACACS+

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ allows credentials to be transferred across multiple systems.

SSO

RADIUS

LDAP

TACACS+

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using TCP as its transport protocol, _____ performs authentication, authorization, and accounting as separate functions.

SSO

RADIUS

Kerberos

TACACS+

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network _____ are flaws in software or hardware that could allow an attacker to compromise the security of that network.

fluctuations

vulnerabilities

exploits

threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authorization on a network resource can only occur after successful authentication.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Illegitimate ___________ usually presents itself in the form of a pop-up.

adware

software

botware

freeware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Viruses are typically transmitted by harmless-looking software that is downloaded by users onto their computers.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?