Security 2

Security 2

11th - 12th Grade

24 Qs

quiz-placeholder

Similar activities

El Computador

El Computador

5th - 11th Grade

20 Qs

Belajar Elemen 1 XI TKJ PSTS 23/24

Belajar Elemen 1 XI TKJ PSTS 23/24

11th Grade

20 Qs

From Binary To Denary Conversion - IGCSE

From Binary To Denary Conversion - IGCSE

7th Grade - Professional Development

20 Qs

CSS - Computer Systems Services

CSS - Computer Systems Services

12th Grade

20 Qs

Yr7- Understanding computers Lessons 1-3

Yr7- Understanding computers Lessons 1-3

7th - 11th Grade

20 Qs

Database e SQL

Database e SQL

11th Grade

20 Qs

Diagramas de Flujo

Diagramas de Flujo

12th Grade

21 Qs

Teknik Pengolahan Audio dan Video

Teknik Pengolahan Audio dan Video

12th Grade

20 Qs

Security 2

Security 2

Assessment

Quiz

Computers

11th - 12th Grade

Hard

Created by

Paul Getz

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following Active Directory concepts can help enforce security settings? (Choose two.)

EFS

Group Policy/updates

Port security

Login scripts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What 128-bit block encryption that uses an encryption key of 128, 192, or 256 bits is used in WPA2 and is more secure than TKIP?

AES

VPN

RADIUS

Kerberos

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol was designed to authenticate remote users to a dial-in access server?

TKIP

TACACS+

VPN

RADIUS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is complaining that they can no longer sign into their account because of too many bad attempts. What basic Active Directory function is at work here?

Failed login attempts restrictions

Antivirus/anti-malware

A bollard

A rootkit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What concept in Active Directory creates a directory subdivision within which may be placed users, groups, computers and other objects?

User

Domain

Organizational unit

Home folder

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following authentication encryption protocols is older than the others and was developed by Cisco but became an open protocol in the 1990s and can be found on Linux distributions?

AES

TACACS+

Kerberos

RADIUS

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Your data center recently experienced a theft of a server from the rack. Which security mechanisms would protect servers from future theft? (Choose two.)

Equipment locks

Security token

Alarm systems

Hard token

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?