CompTIA Sec+ Chapter 3, 2nd Attempt Missed

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

12th Grade

23 Qs

quiz-placeholder

Similar activities

Name The Disney Animation Films

Name The Disney Animation Films

KG - University

20 Qs

Clean, Sanitize and Store Kitchen Tools and Equipment

Clean, Sanitize and Store Kitchen Tools and Equipment

11th - 12th Grade

20 Qs

12AIT - All About W3C <3

12AIT - All About W3C <3

10th Grade - University

18 Qs

Summative Test in EMPTECH 3rd

Summative Test in EMPTECH 3rd

12th Grade

20 Qs

History of Package Design

History of Package Design

9th - 12th Grade

20 Qs

NP IT Quiz ปริศนาไอที #4

NP IT Quiz ปริศนาไอที #4

9th - 12th Grade

20 Qs

PRE & POST MAINTENANCE

PRE & POST MAINTENANCE

1st - 12th Grade

20 Qs

Latihan Soal SIMKOMDIG

Latihan Soal SIMKOMDIG

12th Grade

20 Qs

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

blackpanther300 blackpanther300

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Chris is preparing to implement an 802.1X-enabled wireless infrastructure. He knows that he wants to use an Extensible Authentication Protocol (EAP)-based protocol that does not require client-side certificates. Which of the following options should he choose?

EAP-MD5

PEAP

LEAP

EAP-TLS

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Mark is responsible for managing his company's load balancer and wants to use a load-balancing scheduling technique that will take into account the current server load and active sessions. Which of the following techniques should he choose?

Source IP hashing

Weighted response time

Least connection

Round robin

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?

DMZ

VLAN

Router

Guest network

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the equivalent of a VLAN from a physical security perspective?

Perimeter security

Partitioning

Security zones

Firewall

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of firewall examines the content and context of each packet it encounters?

Packet filtering firewall

Stateful packet filtering firewall

Application layer firewall

Gateway firewall

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You're designing a new network infrastructure so that your company can allow unauthenticated users connecting from the Internet to access certain areas. Your goal is to protect the internal network while providing access to those areas. You decide to put the web server on a separate subnet open to public contact. What is this subnet called?

Guest network

DMZ

Intranet

VLAN

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hans is a security administrator for a large company. Users on his network visit a wide range of websites. He is concerned they might get malware from one of these many websites. Which of the following would be his best approach to mitigate this threat?

Implement host-based antivirus.

Blacklist known infected sites.

Set browsers to allow only signed components.

Set browsers to block all active content (ActiveX, JavaScript, etc.).

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?