98-367

98-367

10th Grade - Professional Development

21 Qs

quiz-placeholder

Similar activities

TEST1.PY

TEST1.PY

10th Grade - University

20 Qs

Berpikir Komputasional

Berpikir Komputasional

9th - 12th Grade

20 Qs

UH 1 Teknologi wan

UH 1 Teknologi wan

12th Grade

20 Qs

SQL - parte 1

SQL - parte 1

Professional Development

17 Qs

GEMATMW - Cryptography

GEMATMW - Cryptography

University - Professional Development

16 Qs

ĐC CNTT_Chương 1

ĐC CNTT_Chương 1

University

20 Qs

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

PTS PWPB Kelas 11 Sem 1

PTS PWPB Kelas 11 Sem 1

11th Grade

21 Qs

98-367

98-367

Assessment

Quiz

Computers

10th Grade - Professional Development

Practice Problem

Hard

Created by

Djouvens Narcisse

Used 88+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A virus does not need a carrier in order to propagate itself.

A polymorphic virus changes its code so that it cannot be detected easily.

A stealth virus hides itself in the master boot record.

2.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A stateful firewall allows only packets matching known active connections; others are rejected.

An example of a stateless firewall is an access list on a router.

Dedicated hardware firewalls are primarily stateless.

3.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Phishing is a form of online identity theft.

Antivirus apps have the latest blacklists for email addresses and domains and always keep those up to date.

Spoofing is the act of sending large amounts of unrequested emails.

4.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Application

Network

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Failed logon events

Account lockout after a reasonable number of failed logon attempts

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

DNSSEC helps prevent pharming and man-in-the-middle attacks.

DNSSEC uses a digital signature to create a chain of authority.

DNSSEC is proprietary to Microsoft Domain Name Servers.

7.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

IPSec uses digital signatures to create a chain of authority.

IPSec uses digital signatures to create a chain of authority.

IPSec is used to create a secure tunnel between two computing devices.

IPSec encrypts data packets using AH.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers