CompTIA Network+ N10-008 Chapter 13

CompTIA Network+ N10-008 Chapter 13

University

13 Qs

quiz-placeholder

Similar activities

Chapter 14 Controlling and Monitoring Access

Chapter 14 Controlling and Monitoring Access

University

10 Qs

IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

9th Grade - University

18 Qs

Cyberecurity Ess 2

Cyberecurity Ess 2

University

12 Qs

Computer Security Risk

Computer Security Risk

12th Grade - University

16 Qs

Computer & Security Essentials Day 12 Review

Computer & Security Essentials Day 12 Review

University

18 Qs

Final Exam

Final Exam

KG - University

11 Qs

Quzziz 4 : Topic 4

Quzziz 4 : Topic 4

University

10 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

CompTIA Network+ N10-008 Chapter 13

CompTIA Network+ N10-008 Chapter 13

Assessment

Quiz

Computers

University

Hard

Created by

Christopher Wilson

Used 46+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You’re doing network consulting for a small research firm, and there’s more paperwork to the deal than you ever expected. Of the documents you have to sign, which one covers your obligations to protect any trade secrets or proprietary information they share with you?
BPA
MOU
NDA
SLA

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is most likely to be part of an AUP?
How often employee evaluations should be conducted
What to do when a workstation shows signs of malware infection
Whether you can access streaming music services from your workstation
Who is in charge of a critical database

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Your company allows users to use their smartphones for company business and join them to the office network. After several security incidents, management is considering a new policy that involves company-issued phones. What term describes the original policy?
BYOD
COBO
COPE
CYOD

4.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

You’ve been asked to bring an old password policy in compliance with current best practices and NIST recommendations. Which of the following current rules should be changed?
Newly created passwords are checked against the current list of known weak passwords.
Passwords must be changed at least every 90 days.
Passwords must never be emailed, printed, or written down.
Passwords should be at least six characters.
Passwords that have been changed should never be reused.

5.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

You’re designing a set of role-based policy documents for different people in your company. Which of the following should definitely be in policies for managerial staff?
A complete list of technical standards used in the network
A list of who is responsible for which network assets
Legal and regulatory requirements applicable to company IT functions
Procedures for conducting a server backup
Procedures for revising or changing security policies

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is true of a work instruction but not a standard operating procedure?
Defines what criteria must be met to complete the task successfully
Defines who is responsible for each step of the operation
Leaves little room for error or interpretation
Provides a step by step procedure for completing a task

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following network documents is likely to go longest without major changes?
Logical network diagram
Physical network diagram
Site survey report
Wiring diagram

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?