8 2c

8 2c

12th Grade

57 Qs

quiz-placeholder

Similar activities

Cybersecurity Unit 4

Cybersecurity Unit 4

9th - 12th Grade

57 Qs

COmputer CH 2

COmputer CH 2

1st Grade - University

58 Qs

Form 1 Pre-Test Computer Basics

Form 1 Pre-Test Computer Basics

3rd - 12th Grade

60 Qs

104 Review

104 Review

10th Grade - Professional Development

53 Qs

Grade 6 ICT Review - Noah

Grade 6 ICT Review - Noah

8th Grade - University

54 Qs

XII Networking & Cyber Security

XII Networking & Cyber Security

9th - 12th Grade

60 Qs

Module 2 Test Review

Module 2 Test Review

7th Grade - University

56 Qs

It Fund study guide

It Fund study guide

9th - 12th Grade

52 Qs

8 2c

8 2c

Assessment

Quiz

Computers

12th Grade

Easy

Created by

De'Andre Sellers

Used 2+ times

FREE Resource

57 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of network vulnerability mitigation?

To enhance network speed

To increase data storage capacity

To protect against threats and unauthorized access

To reduce the cost of network maintenance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common network threat mentioned in the text?

System crashes

Unauthorized access

Data manipulation

Internal controls

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the text, what does NIST define as fault tolerance?

The ability of a system to operate without electricity

The ability of a system to prevent all cyber attacks

The property of a system that allows proper operation even if components fail

The process of updating system software regularly

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended solution for achieving fault tolerance in a network?

Using a single power supply

Limiting access to the network

Implementing Redundant Arrays of Independent Disks (RAIDs)

Decreasing the number of servers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary benefit of implementing the Principle of Least Privilege (PoLP) in assigning rights and permissions?

To give everyone equal access

To minimize security risks by limiting access

To increase system efficiency by allowing more access

To simplify the management of network systems

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of an Access Control List (ACL) in a system?

It defines the physical components of a system

It lists the users who can access the system hardware

It specifies what users can and cannot do within a system

It monitors and logs user activity on a system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the text, why is it important to have data backups?

To prevent system crashes

To restore lost data in the event of a system failure

To increase data processing speed

To comply with user access policies

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?