Cisco_Sem2_Mod10

Cisco_Sem2_Mod10

1st - 5th Grade

21 Qs

quiz-placeholder

Similar activities

Higher Business Management Marketing Revision

Higher Business Management Marketing Revision

KG - University

20 Qs

Pivot Animator Quiz!

Pivot Animator Quiz!

5th Grade

16 Qs

PERKEMBANGAN TEKNOLOGI BEGERAK 1B-12

PERKEMBANGAN TEKNOLOGI BEGERAK 1B-12

KG - Professional Development

20 Qs

ADMINISTRASI SISTEM JARINGAN (ASJ) KELAS XII 1

ADMINISTRASI SISTEM JARINGAN (ASJ) KELAS XII 1

1st Grade

20 Qs

Avaliação das Apresentações

Avaliação das Apresentações

1st Grade

17 Qs

AIJ XI TKJ

AIJ XI TKJ

1st Grade

19 Qs

Computer Lab Rules

Computer Lab Rules

1st - 6th Grade

19 Qs

A COMPUTER SYSTEM

A COMPUTER SYSTEM

2nd - 3rd Grade

18 Qs

Cisco_Sem2_Mod10

Cisco_Sem2_Mod10

Assessment

Quiz

Computers

1st - 5th Grade

Medium

Created by

Alexander Alves

Used 20+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

True or False, For about 20 years (from 1962 to 1977), the computer controlled launch code for the US nuclear missiles was 00000000

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Distributed Denial of Service (DDoS) attack?

This is an attack in which an organization’s data servers or hosts are compromised to steal confidential information

This is an attack in which an organization’s hosts are infected with malicious software that cause a variety of problems

This is an attack using a Trojan Horse

This is a coordinated attack from many devices, called zombies, with the intention of degrading or halting public access to an organization’s website and resources

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Various network security devices are required to protect the network perimeter from outside access, select All of the devices

Virtual Private Network (VPN) enabled router

Next-Generation Firewall (NGFW)

Network Access Control (NAC)

Network Internet Control (NIC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, endpoints are particularly susceptible to malware-related attacks that originate through email or web browsing. ​

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SMTP stand for?

Simple Male Transfer Protocol

Simple Map Transfer Protocol

Simple Mail Transfiguration Protocol

Simple Mail Transfer Protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, the Cisco Web Security Appliance (WSA) is a mitigation technology for web-based threats

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

AAA stands for?

Alteration, Authorization, and Accounting

Authentication, Authorization, and Accounting

Authentication, Alteration, and Accounting

Authentication, Authorization, and Alteration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?