
Cybersecurity Midterm
Authored by Joseph Gilliam
Computers
9th - 12th Grade
Used 36+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
93 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?
Configure account lockout in Group Policy.
Configure account policies in Group Policy.
Configure account expiration in the user accounts.
Configure day/time restrictions in the user accounts.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Microsoft tool can be used to review a system's security configuration against recommended settings?
Microsoft Security Compliance Toolkit
Registry Editor
Microsoft Internet Explorer
Windows Defender
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of update should be prioritized even outside of a normal patching window?
Microsoft updates
Security updates
Critical updates
Monthly updates
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following makes this documentation more useful? (select 3)
Have a printed hard copy kept in a secure location.
Identify the choke points on the network.
Automate administration as much as possible.
Identify who is responsible for each device.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)
WSUS
Security Templates
Group Policy
Security Configuration and Analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a configuration baseline?
A list of common security settings that a group or all devices share
A collection of security settings that can be automatically applied to a device
A set of performance statistics that identifies normal operating performance
The minimum services required for a server to function
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By definition, what is the process of reducing security exposure and tightening security controls?
Hardening
Passive reconnaissance
Social engineering
Active scanning
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
90 questions
ITS AI Glossary
Quiz
•
11th Grade
90 questions
Quiz Pengolah Grafis
Quiz
•
12th Grade
98 questions
FIRST QUARTERLY EXAMINATION - GRADE 4 - HELE/COMPUTER
Quiz
•
4th Grade - University
90 questions
Java - Chapter 7 - 8
Quiz
•
9th - 12th Grade
93 questions
Sistem Komputer Dasar
Quiz
•
10th Grade
90 questions
Exploring Data Processing and Computing
Quiz
•
10th Grade
96 questions
Algorithms
Quiz
•
10th Grade
93 questions
WJEC GCE DigiTech - Connected Systems
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade