
CNET151 Chapt 11 Network & Vulnerability Scanning
Authored by Karen Diggs
Computers
University
Used 65+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The first rule of computer security is to check _________.
Patches
Ports
Policies
Probes
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Any ________ you do not explicitly need should be shut down.
Patch
Port
Policy
Probe
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For an individual machine that is not running firewall software, you do not directly close ports; instead, you shut down the ________ using that port.
Patch
Router
Policy
Service
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password policy for a 90- or 180-day replacement schedule is called password ________.
History
Uniqueness
Age
Update
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You would set a ________ to prevent users from immediately changing their password several times in one day to return to their current password.
Minimum password age
Maximum password age
Minimum password length
Maximum password length
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A good password has at least ________ characters.
6
8
10
12
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Probing your network for security flaws should occur once a quarter, and a complete audit of your security should be completed ________ per year.
Once
Twice
Three times
Four times
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?