
Building and Securing a Small Network
Authored by blaxlistZ blaxlistZ
Computers
University
Used 50+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
62 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which component is designed to protect against unauthorized communications to and from a computer?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 10 attempts 2 within 30
RouterA(config)# login block-for 30 attempts 2 within 10
RouterA(config)# login block-for 2 attempts 30 within 10
RouterA(config)# login block-for 30 attempts 10 within 2
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the network security accounting function?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack may involve the use of tools such as nslookup and fping?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which example of malicious code would be classified as a Trojan horse?
malware that was written to look like a video game
malware that requires manual user intervention to spread between systems
malware that attaches itself to a legitimate program and spreads to other programs when launched
malware that can automatically spread from one system to another by exploiting a vulnerability in the target
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between a virus and a worm?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves a compromise of data that occurs between two end points?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?