Chapter 9 Review Practice Quiz

Chapter 9 Review Practice Quiz

University

15 Qs

quiz-placeholder

Similar activities

Gerência do Processador

Gerência do Processador

University

16 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

PHP First Internal Practical Viva

PHP First Internal Practical Viva

University

20 Qs

Tin 8/1

Tin 8/1

KG - University

10 Qs

Assessment 08

Assessment 08

University

15 Qs

Prework Etapa 1 - Bogotá

Prework Etapa 1 - Bogotá

University

10 Qs

Chapter 9 Review Practice Quiz

Chapter 9 Review Practice Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Ankur Chattopadhyay

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a technique you can use to help secure a wireless network? (Choose all that apply.)

IP subnetting

MAC address filtering

WPA3

SSID broadcast

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these protocols is used for VPNs? (Choose all that apply.)

PPTP

WEP

SSTP

L2TP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do virtual private networks ensure privacy?

Tunneling

Concentrating

Encapsulating

Authenticating

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets sothat the server can’t respond to normal traffic?

DDR

ICMP

Dos

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a guideline for

creating a security policy?

A security policy should be cryptic so

that attackers can’t understand it.

A security policy should be general

enough so that rules can be added as

needed.

A security policy should be

enforceable.

A security policy should have

different provisions depending on the

user.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a component of

a security policy? (Choose all that apply.)

Authentication policy

Privacy policy

Network configuration policy

Computer specification policy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which procedure specifies what

resources users can access and the tasks they can perform on a network?

Authentication

Auditing

Authorization

Logon

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?