Cisco_Sem2_Mod10+11

Cisco_Sem2_Mod10+11

1st - 5th Grade

34 Qs

quiz-placeholder

Similar activities

Technology Class Trivia Questions

Technology Class Trivia Questions

3rd - 5th Grade

33 Qs

MIXED TOPICS

MIXED TOPICS

5th - 10th Grade

30 Qs

Grade 2 (Term 3)

Grade 2 (Term 3)

2nd Grade

30 Qs

ICT P4 Theme1 Revision 1st Term

ICT P4 Theme1 Revision 1st Term

4th Grade

29 Qs

Grade5 W1-4

Grade5 W1-4

5th Grade - University

32 Qs

ICT-Ch-1-Quiz-1

ICT-Ch-1-Quiz-1

5th Grade

33 Qs

Computational Thinking One Vocabulary - Code Avengers

Computational Thinking One Vocabulary - Code Avengers

2nd - 5th Grade

29 Qs

CLASS 5 END TERM 2 2021 COMPUTER EXAMS

CLASS 5 END TERM 2 2021 COMPUTER EXAMS

5th Grade

30 Qs

Cisco_Sem2_Mod10+11

Cisco_Sem2_Mod10+11

Assessment

Quiz

Computers

1st - 5th Grade

Practice Problem

Medium

Created by

Alexander Alves

Used 22+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

True or False, For about 16 years (from 1962 to 1977), the computer controlled launch code for the US nuclear missiles was 00000000

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Distributed Denial of Service (DDoS) attack?

This is an attack in which an organization’s data servers or hosts are compromised to steal confidential information

This is an attack in which an organization’s hosts are infected with malicious software that cause a variety of problems

This is an attack using a Trojan Horse

This is a coordinated attack from many devices, called zombies, with the intention of degrading or halting public access to an organization’s website and resources

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Various network security devices are required to protect the network perimeter from outside access, select All of the devices

Virtual Private Network (VPN) enabled router

Next-Generation Firewall (NGFW)

Network Access Control (NAC)

Network Internet Control (NIC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, endpoints are particularly susceptible to malware-related attacks that originate through email or web browsing. ​

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SMTP stand for?

Simple Male Transfer Protocol

Simple Map Transfer Protocol

Simple Mail Transfiguration Protocol

Simple Mail Transfer Protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, the Cisco Web Security Appliance (WSA) is a mitigation technology for web-based threats

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

AAA stands for?

Alteration, Authorization, and Accounting

Authentication, Authorization, and Accounting

Authentication, Alteration, and Accounting

Authentication, Authorization, and Alteration

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers