MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

quiz-placeholder

Similar activities

Computer Network

Computer Network

9th Grade

20 Qs

1.3 Networks (L5)

1.3 Networks (L5)

10th Grade

15 Qs

Networks & Topologies (OCR GCSE)

Networks & Topologies (OCR GCSE)

8th - 10th Grade

21 Qs

Network IGCSE

Network IGCSE

10th Grade

18 Qs

Class 7  (Networking Unit 8.1)

Class 7 (Networking Unit 8.1)

6th - 8th Grade

20 Qs

Basic Network

Basic Network

10th Grade

16 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

1.3 - Client-Server and Peer to Peer Networks

1.3 - Client-Server and Peer to Peer Networks

8th - 10th Grade

15 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

Assessment

Quiz

Education, Professional Development, Computers

KG - Professional Development

Medium

Created by

Sean H278

Used 157+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To implement WPA2 Enterprise, you would need a/an

RADIUS server

SSL server

WEP server

VPN server

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Active Directory controls, enforces, and assigns security policies and access rights for all users. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

NTFS permissions

User Account Control

Registry

No change is needed

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Role separation improves server security by

Enforcing principle of least privilege

Installing applications on separate hard disks

Physically separating high security servers from other servers

Placing servers on separate VLANs

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image
Media Image

select picture

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Phishing

Malware

Reverse Social engineering

No change is needed

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Password history policies are used to prevent:

Brute force attacks

Users from sharing passwords

Social engineering

Passwords from being reused immediately

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the standard or basic collection of NTFS permissions?

Read and execute, read, write, full control, modify, list folder contents

Change permissions, read permissions, write permissions

Read attributes, list folder/read data, traverse folder/execute file

Create files/write data, create folders/append data, take ownership

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?