Search Header Logo

CNET151 Chapt 11 Network & Vulnerability Scanning

Authored by Karen Diggs

Computers

University

Used 64+ times

CNET151 Chapt 11 Network & Vulnerability Scanning
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The first rule of computer security is to check _________.

Patches

Ports

Policies

Probes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any ________ you do not explicitly need should be shut down.

Patch

Port

Policy

Probe

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For an individual machine that is not running firewall software, you do not directly close ports; instead, you shut down the ________ using that port.

Patch

Router

Policy

Service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password policy for a 90- or 180-day replacement schedule is called password ________.

History

Uniqueness

Age

Update

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You would set a ________ to prevent users from immediately changing their password several times in one day to return to their current password.

Minimum password age

Maximum password age

Minimum password length

Maximum password length

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A good password has at least ________ characters.

6

8

10

12

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year.

Once

Twice

Three times

Four times

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?