Network Security 3

Network Security 3

11th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Database e SQL

Database e SQL

11th Grade

20 Qs

Diagramas de Flujo

Diagramas de Flujo

12th Grade

21 Qs

Remidi XI TKJ2 UH 2 Teknologi Jaringan WAN

Remidi XI TKJ2 UH 2 Teknologi Jaringan WAN

11th Grade

20 Qs

UNIT 3- DATA COMMUNICATION

UNIT 3- DATA COMMUNICATION

12th Grade

20 Qs

El Computador

El Computador

5th - 11th Grade

20 Qs

Belajar Elemen 1 XI TKJ PSTS 23/24

Belajar Elemen 1 XI TKJ PSTS 23/24

11th Grade

20 Qs

CSS - Computer Systems Services

CSS - Computer Systems Services

12th Grade

20 Qs

Yr7- Understanding computers Lessons 1-3

Yr7- Understanding computers Lessons 1-3

7th - 11th Grade

20 Qs

Network Security 3

Network Security 3

Assessment

Quiz

Computers

11th - 12th Grade

Hard

Created by

Paul Getz

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the mechanisms often used to implement a defense in depth strategy?

Screened subnets

Network segmentation enforcement

Honeypots

Access control vestibules

Social engineering

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

As part of her company's new risk management initiative, Alice has been assigned the task of performing a threat assessment for the firm's data resources. For each potential threat she discovers, which of the following elements should Alice estimate? (Choose all that apply.)

Severity

Mitigation

Likelihood

Posture

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice has been assigned the task of examining her department's order entry procedure, to determine whether it meets established cost, quality, and timeliness goals. Which of the following is the best term for this examination?

Vendor assessment

Process assessment

Business assessment

Risk assessment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user calls the help desk, complaining that he cannot access any of the data on his computer. A message has also appeared on his screen stating that his data has been encrypted and that it will only be decrypted after he pays $768 in digital currency to an unknown address. Which of the following types of attack has the user experienced?

War driving

Ransomware

Denial-of-Service

ARP poisoning

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following attack types typically involves modifying network packets while they are in transit? (Choose all that apply.)

Spoofing

Denial-of-Service

On-path

Logic bomb

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of attack involves the modification of a legitimate software product?

Social engineering

War driving

Logic bomb

Evil twin

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following steps can help to prevent war driving attacks from compromising your wireless network? (Choose all that apply.)

Configure your access point to use a longer SSID.

Configure your access point not to broadcast its SSID.

Configure your clients and access point to use WPA2 security.

Configure your clients and access point to use WEP security.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?