
98-367
Authored by Djouvens Narcisse
Computers
10th Grade - Professional Development
Used 88+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
A virus does not need a carrier in order to propagate itself.
A polymorphic virus changes its code so that it cannot be detected easily.
A stealth virus hides itself in the master boot record.
2.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
A stateful firewall allows only packets matching known active connections; others are rejected.
An example of a stateless firewall is an access list on a router.
Dedicated hardware firewalls are primarily stateless.
3.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Phishing is a form of online identity theft.
Antivirus apps have the latest blacklists for email addresses and domains and always keep those up to date.
Spoofing is the act of sending large amounts of unrequested emails.
4.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Application
Network
5.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Failed logon events
Account lockout after a reasonable number of failed logon attempts
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
DNSSEC helps prevent pharming and man-in-the-middle attacks.
DNSSEC uses a digital signature to create a chain of authority.
DNSSEC is proprietary to Microsoft Domain Name Servers.
7.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
IPSec uses digital signatures to create a chain of authority.
IPSec uses digital signatures to create a chain of authority.
IPSec is used to create a secure tunnel between two computing devices.
IPSec encrypts data packets using AH.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?