98-367

98-367

10th Grade - Professional Development

21 Qs

quiz-placeholder

Similar activities

Keeping Information Secure

Keeping Information Secure

10th - 12th Grade

16 Qs

 Protección Contra Virus Informáticos

Protección Contra Virus Informáticos

University

20 Qs

Puertos TCP/UDP

Puertos TCP/UDP

10th Grade - University

16 Qs

Cybersecurity Awareness

Cybersecurity Awareness

12th Grade

20 Qs

Device Config and Mgmt, Module 3 quiz

Device Config and Mgmt, Module 3 quiz

9th - 12th Grade

16 Qs

CompTIA Sec+

CompTIA Sec+

University - Professional Development

20 Qs

Networking Ch 6 - Firewalls

Networking Ch 6 - Firewalls

9th - 12th Grade

25 Qs

Year 11 ICT Online Goods and Services

Year 11 ICT Online Goods and Services

10th Grade

20 Qs

98-367

98-367

Assessment

Quiz

Computers

10th Grade - Professional Development

Hard

Created by

Djouvens Narcisse

Used 88+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A virus does not need a carrier in order to propagate itself.

A polymorphic virus changes its code so that it cannot be detected easily.

A stealth virus hides itself in the master boot record.

2.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A stateful firewall allows only packets matching known active connections; others are rejected.

An example of a stateless firewall is an access list on a router.

Dedicated hardware firewalls are primarily stateless.

3.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Phishing is a form of online identity theft.

Antivirus apps have the latest blacklists for email addresses and domains and always keep those up to date.

Spoofing is the act of sending large amounts of unrequested emails.

4.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Application

Network

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Failed logon events

Account lockout after a reasonable number of failed logon attempts

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

DNSSEC helps prevent pharming and man-in-the-middle attacks.

DNSSEC uses a digital signature to create a chain of authority.

DNSSEC is proprietary to Microsoft Domain Name Servers.

7.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

IPSec uses digital signatures to create a chain of authority.

IPSec uses digital signatures to create a chain of authority.

IPSec is used to create a secure tunnel between two computing devices.

IPSec encrypts data packets using AH.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?