Modules 16 – 17

Modules 16 – 17

1st - 5th Grade

62 Qs

quiz-placeholder

Similar activities

GOOGLE SLIDES (8-12)

GOOGLE SLIDES (8-12)

5th - 7th Grade

65 Qs

2nd 9 weeks quize

2nd 9 weeks quize

5th - 9th Grade

60 Qs

video games

video games

KG - Professional Development

63 Qs

Mass: Heavy or light

Mass: Heavy or light

1st Grade - University

60 Qs

Clout-Iot-Bigdata Kelas 08

Clout-Iot-Bigdata Kelas 08

1st Grade

61 Qs

Systemy informatyczne wspomagające zarządzanie TEST

Systemy informatyczne wspomagające zarządzanie TEST

1st - 5th Grade

61 Qs

quiz

quiz

1st Grade

60 Qs

ITEC 85B LESSON 1: Intro to Information Technology

ITEC 85B LESSON 1: Intro to Information Technology

3rd Grade

61 Qs

Modules 16 – 17

Modules 16 – 17

Assessment

Quiz

Instructional Technology

1st - 5th Grade

Medium

Created by

Rambo Cali

Used 5+ times

FREE Resource

62 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which component is designed to protect against unauthorized communications to and from a computer?

  • security center

  • port scanner

  • antimalware

  • antivirus

  • firewall

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

  • RouterA(config)# login block-for 10 attempts 2 within 30

  • RouterA(config)# login block-for 30 attempts 2 within 10

  • RouterA(config)# login block-for 2 attempts 30 within 10

  • RouterA(config)# login block-for 30 attempts 10 within 2

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of the network security accounting function?

  • to require users to prove who they are

  • to determine which resources a user can access

  • to keep track of the actions of a user

  • to provide challenge and response questions

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of attack may involve the use of tools such as nslookup and fping?

  • access attack

reconnaissance attack

  • denial of service attack

  • worm attack

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which example of malicious code would be classified as a Trojan horse?

malware that was written to look like a video game

  • malware that requires manual user intervention to spread between systems

  • malware that attaches itself to a legitimate program and spreads to other programs when launched

  • malware that can automatically spread from one system to another by exploiting a vulnerability in the target

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the difference between a virus and a worm?

  • Viruses self-replicate but worms do not.

  • Worms self-replicate but viruses do not.

  • Worms require a host file but viruses do not.

  • Viruses hide in legitimate programs but worms do not.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack involves a compromise of data that occurs between two end points?

  • denial-of-service

  • man-in-the-middle attack

  • extraction of security parameters

  • username enumeration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?