98-367

98-367

10th Grade - Professional Development

21 Qs

quiz-placeholder

Similar activities

Cybersecurity Knowledge Assessment

Cybersecurity Knowledge Assessment

University

25 Qs

UNIT-IV: E-mail and IP Security

UNIT-IV: E-mail and IP Security

University

25 Qs

Information and cyber security Quiz.

Information and cyber security Quiz.

Professional Development

25 Qs

Security Fundamentals

Security Fundamentals

10th - 12th Grade

23 Qs

OCR J277 - 1.4 - Network Security - Knowledge Check

OCR J277 - 1.4 - Network Security - Knowledge Check

10th Grade

20 Qs

MOC 20744C-Securing Windows Server 2016 - Part 2

MOC 20744C-Securing Windows Server 2016 - Part 2

Professional Development

17 Qs

IP Sec

IP Sec

University

18 Qs

Network Security 2

Network Security 2

University

21 Qs

98-367

98-367

Assessment

Quiz

Computers

10th Grade - Professional Development

Hard

Created by

Djouvens Narcisse

Used 88+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A virus does not need a carrier in order to propagate itself.

A polymorphic virus changes its code so that it cannot be detected easily.

A stealth virus hides itself in the master boot record.

2.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A stateful firewall allows only packets matching known active connections; others are rejected.

An example of a stateless firewall is an access list on a router.

Dedicated hardware firewalls are primarily stateless.

3.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Phishing is a form of online identity theft.

Antivirus apps have the latest blacklists for email addresses and domains and always keep those up to date.

Spoofing is the act of sending large amounts of unrequested emails.

4.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Application

Network

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Failed logon events

Account lockout after a reasonable number of failed logon attempts

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

DNSSEC helps prevent pharming and man-in-the-middle attacks.

DNSSEC uses a digital signature to create a chain of authority.

DNSSEC is proprietary to Microsoft Domain Name Servers.

7.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

IPSec uses digital signatures to create a chain of authority.

IPSec uses digital signatures to create a chain of authority.

IPSec is used to create a secure tunnel between two computing devices.

IPSec encrypts data packets using AH.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?