
Networking Unit 10
Authored by WILLIAM BELIVEAU
Computers
9th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?
Posture assessment
Data breach
Security audit
Exploit
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of DoS attack orchestrates an attack bounced off uninfected computers?
Ransomware
PDoS attack
FTP bounce
DRDoS attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Phishing
Baiting
Quid pro quo
Tailgating
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Vulnerability
Insider threat
Denial of service
Principle of least privilege
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack relies on spoofing?
Deauth attack
Friendly DoS attack
Tailgating
Pen testing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?
Smart locker
Locking rack
Locking cabinet
Access control vestibule
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Logic bomb
Worm
Virus
Ransomware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
14 questions
TCP/IP & other protocols [A Level]
Quiz
•
12th Grade
10 questions
Abhyudaya coding class - Grade 7
Quiz
•
6th Grade - University
10 questions
MIL March 8, 2023
Quiz
•
12th Grade
10 questions
What would you do if...
Quiz
•
1st - 12th Grade
10 questions
NHTW Programming
Quiz
•
9th Grade
10 questions
Activity 1: How well do you know Java?
Quiz
•
9th Grade
15 questions
4.6.4 Logic Gates
Quiz
•
10th Grade - Professi...
12 questions
Wee Word Intro
Quiz
•
7th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade