Networking Unit 10

Networking Unit 10

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz 3

Cybersecurity Quiz 3

10th Grade

15 Qs

Website Security

Website Security

7th - 12th Grade

10 Qs

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

14.5.2 - Quiz on Social Engineering Attacks

14.5.2 - Quiz on Social Engineering Attacks

10th Grade

15 Qs

CCST Attacks and Threats - Chapter 19

CCST Attacks and Threats - Chapter 19

9th - 12th Grade

8 Qs

Drones. Good or bad?

Drones. Good or bad?

6th - 9th Grade

12 Qs

Physical Security Quiz

Physical Security Quiz

9th Grade - University

10 Qs

Networking Unit 10

Networking Unit 10

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

WILLIAM BELIVEAU

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?

Posture assessment

Data breach

Security audit

Exploit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of DoS attack orchestrates an attack bounced off uninfected computers?

Ransomware

PDoS attack

FTP bounce

DRDoS attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

Phishing

Baiting

Quid pro quo

Tailgating

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Vulnerability

Insider threat

Denial of service

Principle of least privilege

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack relies on spoofing?

Deauth attack

Friendly DoS attack

Tailgating

Pen testing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?

Smart locker

Locking rack

Locking cabinet

Access control vestibule

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic bomb

Worm

Virus

Ransomware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?