Cybersecurity Midterm

Cybersecurity Midterm

9th - 12th Grade

93 Qs

quiz-placeholder

Similar activities

TECH Troubleshooting Theory

TECH Troubleshooting Theory

9th - 12th Grade

88 Qs

Computer Science 3rd form Dec 2021

Computer Science 3rd form Dec 2021

8th - 9th Grade

90 Qs

 J277 GCSE Computer Science  - 1.1 Systems architecture

J277 GCSE Computer Science - 1.1 Systems architecture

7th - 11th Grade

88 Qs

J277-01 Parts 1.1, 1.2 & 1.6

J277-01 Parts 1.1, 1.2 & 1.6

8th - 10th Grade

93 Qs

BÀI TẬP ÔN TẬP KIỂM TRA GIỮA KỲ 1 - TIN HỌC 11

BÀI TẬP ÔN TẬP KIỂM TRA GIỮA KỲ 1 - TIN HỌC 11

11th Grade

90 Qs

SQL: GROUP Functions

SQL: GROUP Functions

8th Grade - Professional Development

97 Qs

Malicious Software

Malicious Software

8th - 10th Grade

95 Qs

big computing quiz

big computing quiz

9th - 12th Grade

92 Qs

Cybersecurity Midterm

Cybersecurity Midterm

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Joseph Gilliam

Used 36+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

93 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?

Configure account lockout in Group Policy.

Configure account policies in Group Policy.

Configure account expiration in the user accounts.

Configure day/time restrictions in the user accounts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Microsoft tool can be used to review a system's security configuration against recommended settings?

Microsoft Security Compliance Toolkit

Registry Editor

Microsoft Internet Explorer

Windows Defender

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of update should be prioritized even outside of a normal patching window?

Microsoft updates

Security updates

Critical updates

Monthly updates

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following makes this documentation more useful? (select 3)

Have a printed hard copy kept in a secure location.

Identify the choke points on the network.

Automate administration as much as possible.

Identify who is responsible for each device.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)

WSUS

Security Templates

Group Policy

Security Configuration and Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a configuration baseline?

A list of common security settings that a group or all devices share

A collection of security settings that can be automatically applied to a device

A set of performance statistics that identifies normal operating performance

The minimum services required for a server to function

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By definition, what is the process of reducing security exposure and tightening security controls?

Hardening

Passive reconnaissance

Social engineering

Active scanning

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers