Cybersecurity Midterm
Quiz
•
Computers
•
9th - 12th Grade
•
Easy
Joseph Gilliam
Used 36+ times
FREE Resource
Enhance your content in a minute
93 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?
Configure account lockout in Group Policy.
Configure account policies in Group Policy.
Configure account expiration in the user accounts.
Configure day/time restrictions in the user accounts.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Microsoft tool can be used to review a system's security configuration against recommended settings?
Microsoft Security Compliance Toolkit
Registry Editor
Microsoft Internet Explorer
Windows Defender
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of update should be prioritized even outside of a normal patching window?
Microsoft updates
Security updates
Critical updates
Monthly updates
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following makes this documentation more useful? (select 3)
Have a printed hard copy kept in a secure location.
Identify the choke points on the network.
Automate administration as much as possible.
Identify who is responsible for each device.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)
WSUS
Security Templates
Group Policy
Security Configuration and Analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a configuration baseline?
A list of common security settings that a group or all devices share
A collection of security settings that can be automatically applied to a device
A set of performance statistics that identifies normal operating performance
The minimum services required for a server to function
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By definition, what is the process of reducing security exposure and tightening security controls?
Hardening
Passive reconnaissance
Social engineering
Active scanning
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
88 questions
Asesmen Diagnostik Non-Kognitif
Quiz
•
9th - 12th Grade
98 questions
tin lớp 12
Quiz
•
12th Grade
89 questions
Data or Information Quiz
Quiz
•
10th Grade
97 questions
devnet
Quiz
•
12th Grade
94 questions
Quiz sobre Protocolo UDP
Quiz
•
12th Grade
93 questions
Ôn Tập Giữa Học Kỳ 1 - Tin Học 11
Quiz
•
11th Grade - University
90 questions
Stage 5 computer Tech: Networks Topic Test
Quiz
•
10th Grade
95 questions
Java - Ch. 1 - 6 Review
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
