Chapter 9 Review Practice Quiz

Chapter 9 Review Practice Quiz

University

15 Qs

quiz-placeholder

Similar activities

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

ITBP301_Chapter 06

ITBP301_Chapter 06

University

10 Qs

CIA Triad Quiz

CIA Triad Quiz

University

20 Qs

DSP-Minor1

DSP-Minor1

University

20 Qs

CompTIA A+ Objectives 2.1-2.4

CompTIA A+ Objectives 2.1-2.4

University

10 Qs

Password Safety & Security

Password Safety & Security

KG - Professional Development

11 Qs

Securing Your Identity: MFA Edition

Securing Your Identity: MFA Edition

University

15 Qs

Understand Computer Security and Privacy

Understand Computer Security and Privacy

9th Grade - University

14 Qs

Chapter 9 Review Practice Quiz

Chapter 9 Review Practice Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Ankur Chattopadhyay

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a technique you can use to help secure a wireless network? (Choose all that apply.)

IP subnetting

MAC address filtering

WPA3

SSID broadcast

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these protocols is used for VPNs? (Choose all that apply.)

PPTP

WEP

SSTP

L2TP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do virtual private networks ensure privacy?

Tunneling

Concentrating

Encapsulating

Authenticating

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets sothat the server can’t respond to normal traffic?

DDR

ICMP

Dos

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a guideline for

creating a security policy?

A security policy should be cryptic so

that attackers can’t understand it.

A security policy should be general

enough so that rules can be added as

needed.

A security policy should be

enforceable.

A security policy should have

different provisions depending on the

user.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a component of

a security policy? (Choose all that apply.)

Authentication policy

Privacy policy

Network configuration policy

Computer specification policy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which procedure specifies what

resources users can access and the tasks they can perform on a network?

Authentication

Auditing

Authorization

Logon

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?