MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

quiz-placeholder

Similar activities

OCR GCSE Client- server, Peer to Peer

OCR GCSE Client- server, Peer to Peer

9th - 12th Grade

19 Qs

Network Server

Network Server

8th Grade

19 Qs

Year 7_Mid Unit Quiz_Unit 7.3 Digital Storage

Year 7_Mid Unit Quiz_Unit 7.3 Digital Storage

7th Grade

15 Qs

CSC134 Chapter 8

CSC134 Chapter 8

University

17 Qs

Computer Network Basics

Computer Network Basics

7th - 8th Grade

20 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Networking Vocab

Networking Vocab

9th - 12th Grade

17 Qs

Cambridge Technicals Unit 1

Cambridge Technicals Unit 1

12th Grade

25 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

Assessment

Quiz

Education, Professional Development, Computers

KG - Professional Development

Medium

Created by

Sean H278

Used 157+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To implement WPA2 Enterprise, you would need a/an

RADIUS server

SSL server

WEP server

VPN server

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Active Directory controls, enforces, and assigns security policies and access rights for all users. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

NTFS permissions

User Account Control

Registry

No change is needed

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Role separation improves server security by

Enforcing principle of least privilege

Installing applications on separate hard disks

Physically separating high security servers from other servers

Placing servers on separate VLANs

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image
Media Image

select picture

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Phishing

Malware

Reverse Social engineering

No change is needed

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Password history policies are used to prevent:

Brute force attacks

Users from sharing passwords

Social engineering

Passwords from being reused immediately

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the standard or basic collection of NTFS permissions?

Read and execute, read, write, full control, modify, list folder contents

Change permissions, read permissions, write permissions

Read attributes, list folder/read data, traverse folder/execute file

Create files/write data, create folders/append data, take ownership

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?