Day 10 - Networking & Security I - Day 10 - 2nd Review

Day 10 - Networking & Security I - Day 10 - 2nd Review

University

20 Qs

quiz-placeholder

Similar activities

98-366 Lesson 6 Networking Services

98-366 Lesson 6 Networking Services

10th Grade - University

19 Qs

ASI 4

ASI 4

University

15 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

INTRODUCTION TO BIOMETRICS

INTRODUCTION TO BIOMETRICS

University

20 Qs

Administrasi Sistem Jaringan 3

Administrasi Sistem Jaringan 3

12th Grade - University

20 Qs

Day 8 - Security I - 1st Review - Day 7 Review

Day 8 - Security I - 1st Review - Day 7 Review

University

20 Qs

Pranata Komputer 10

Pranata Komputer 10

University

20 Qs

Review: Information Assurance and Security

Review: Information Assurance and Security

University

20 Qs

Day 10 - Networking & Security I - Day 10 - 2nd Review

Day 10 - Networking & Security I - Day 10 - 2nd Review

Assessment

Quiz

Computers

University

Medium

Created by

Rehan Ahmed

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the theme topic of Day 10 for N&S I?

Network Operations

Network Troubleshooting

Network Security Fundamentals

TACACS+

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ allows credentials to be transferred across multiple systems.

SSO

RADIUS

LDAP

TACACS+

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using TCP as its transport protocol, _____ performs authentication, authorization, and accounting as separate functions.

SSO

RADIUS

Kerberos

TACACS+

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network _____ are flaws in software or hardware that could allow an attacker to compromise the security of that network.

fluctuations

vulnerabilities

exploits

threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authorization on a network resource can only occur after successful authentication.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Illegitimate ___________ usually presents itself in the form of a pop-up.

adware

software

botware

freeware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Viruses are typically transmitted by harmless-looking software that is downloaded by users onto their computers.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?