Network Security 3

Network Security 3

11th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

MS Unit 4 Review

MS Unit 4 Review

Security 1

Security 1

SEC+Practice Quiz B27-B48

SEC+Practice Quiz B27-B48

Sec Review 5

Sec Review 5

Cybersecurity Quiz

Cybersecurity Quiz

Itech Quiz

Itech Quiz

Sec+ review

Sec+ review

MTA Security Review Day 4

MTA Security Review Day 4

Network Security 3

Network Security 3

Assessment

Quiz

Computers

11th - 12th Grade

Hard

Created by

Paul Getz

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the mechanisms often used to implement a defense in depth strategy?

Screened subnets

Network segmentation enforcement

Honeypots

Access control vestibules

Social engineering

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

As part of her company's new risk management initiative, Alice has been assigned the task of performing a threat assessment for the firm's data resources. For each potential threat she discovers, which of the following elements should Alice estimate? (Choose all that apply.)

Severity

Mitigation

Likelihood

Posture

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice has been assigned the task of examining her department's order entry procedure, to determine whether it meets established cost, quality, and timeliness goals. Which of the following is the best term for this examination?

Vendor assessment

Process assessment

Business assessment

Risk assessment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls the help desk, complaining that he cannot access any of the data on his computer. A message has also appeared on his screen stating that his data has been encrypted and that it will only be decrypted after he pays $768 in digital currency to an unknown address. Which of the following types of attack has the user experienced?

War driving

Ransomware

Denial-of-Service

ARP poisoning

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following attack types typically involves modifying network packets while they are in transit? (Choose all that apply.)

Spoofing

Denial-of-Service

On-path

Logic bomb

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of attack involves the modification of a legitimate software product?

Social engineering

War driving

Logic bomb

Evil twin

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following steps can help to prevent war driving attacks from compromising your wireless network? (Choose all that apply.)

Configure your access point to use a longer SSID.

Configure your access point not to broadcast its SSID.

Configure your clients and access point to use WPA2 security.

Configure your clients and access point to use WEP security.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?