Search Header Logo

Networking Unit 10

Authored by WILLIAM BELIVEAU

Computers

9th - 12th Grade

Used 4+ times

Networking Unit 10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?

Posture assessment

Data breach

Security audit

Exploit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of DoS attack orchestrates an attack bounced off uninfected computers?

Ransomware

PDoS attack

FTP bounce

DRDoS attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

Phishing

Baiting

Quid pro quo

Tailgating

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Vulnerability

Insider threat

Denial of service

Principle of least privilege

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack relies on spoofing?

Deauth attack

Friendly DoS attack

Tailgating

Pen testing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?

Smart locker

Locking rack

Locking cabinet

Access control vestibule

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic bomb

Worm

Virus

Ransomware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?