MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

quiz-placeholder

Similar activities

Los antiguos imperios del Asia

Los antiguos imperios del Asia

1st - 3rd Grade

20 Qs

TRÌNH KỸ NĂNG THUYẾT

TRÌNH KỸ NĂNG THUYẾT

KG - University

16 Qs

PASTORAL AND HEBREWS

PASTORAL AND HEBREWS

8th Grade

15 Qs

ICT Service Solutions 2

ICT Service Solutions 2

8th - 12th Grade

17 Qs

The Internet

The Internet

University

20 Qs

SESION 6_COMPETENCIAS DIG. IND.

SESION 6_COMPETENCIAS DIG. IND.

University

15 Qs

Español_Primer_Trimestre_3°

Español_Primer_Trimestre_3°

3rd Grade

20 Qs

Glaze trading india pvt ltd

Glaze trading india pvt ltd

Professional Development

23 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

Assessment

Quiz

Education, Professional Development, Computers

KG - Professional Development

Medium

Created by

Sean H278

Used 157+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To implement WPA2 Enterprise, you would need a/an

RADIUS server

SSL server

WEP server

VPN server

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Active Directory controls, enforces, and assigns security policies and access rights for all users. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

NTFS permissions

User Account Control

Registry

No change is needed

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Role separation improves server security by

Enforcing principle of least privilege

Installing applications on separate hard disks

Physically separating high security servers from other servers

Placing servers on separate VLANs

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image
Media Image

select picture

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Phishing

Malware

Reverse Social engineering

No change is needed

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Password history policies are used to prevent:

Brute force attacks

Users from sharing passwords

Social engineering

Passwords from being reused immediately

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the standard or basic collection of NTFS permissions?

Read and execute, read, write, full control, modify, list folder contents

Change permissions, read permissions, write permissions

Read attributes, list folder/read data, traverse folder/execute file

Create files/write data, create folders/append data, take ownership

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?