Net Sec I Test Review

Net Sec I Test Review

12th Grade

50 Qs

quiz-placeholder

Similar activities

Cloud Architect 50 preg (196-147) v1

Cloud Architect 50 preg (196-147) v1

12th Grade

48 Qs

AHJ: Unit14 Communication

AHJ: Unit14 Communication

12th Grade - University

50 Qs

Module 1: Network Security Certification Exam

Module 1: Network Security Certification Exam

9th - 12th Grade

46 Qs

ITS Networking Domain 2 Network Infrastructures Review

ITS Networking Domain 2 Network Infrastructures Review

11th Grade - University

50 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

45 Qs

CompTIA Sec+ Ultimate Tricky Questions Compendium Part 1

CompTIA Sec+ Ultimate Tricky Questions Compendium Part 1

12th Grade

55 Qs

Authentication/Access Control/Enterprise Architecture

Authentication/Access Control/Enterprise Architecture

9th Grade - University

50 Qs

CompTIA Security+ Testout Practice Quiz - Section 3 Part 1

CompTIA Security+ Testout Practice Quiz - Section 3 Part 1

12th Grade

46 Qs

Net Sec I Test Review

Net Sec I Test Review

Assessment

Quiz

Computers

12th Grade

Hard

Created by

La'Keisha Carter

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following functions are performed by a TPM?

Create a hash of system components

Perform bulk encryption

Encrypt network data using IPsec

Provide authentication credentials

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of control is used to discourage malicious actors from attempting to breach a network?

Preventative

Detective

Deterrent

Physical

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the BEST solution to allow access to private resources from the internet?

VPN

FTP

Packet filters

Subnet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the MOST common form of authentication?

Password

Digital certificate on a smart card

Photo ID

Fingerprint

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is responsible for broadcasting information and data over radio waves?

Wireless access point

Wireless bridge

Wireless interface

Wireless LAN controller

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a phishing attack conducted through a voice channel, such as a phone call?

Vishing

SMiShing

Phishing

Pharming

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is commonly used in the first phase of Internet Key Exchange (IKE) negotiations for authenticating the identity of peers?

Security questions

Digital certificates

Passwords

Biometrics

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?