367-668e9599c27f09d7ba49cf01

367-668e9599c27f09d7ba49cf01

Professional Development

37 Qs

quiz-placeholder

Similar activities

Remedial TKJ XII

Remedial TKJ XII

Professional Development

40 Qs

Administrasi Sistem Jaringan XI

Administrasi Sistem Jaringan XI

Professional Development

36 Qs

Minecraft Quiz

Minecraft Quiz

3rd Grade - Professional Development

37 Qs

St John Trivia 1

St John Trivia 1

Professional Development

41 Qs

IE & IFS QUIZ III

IE & IFS QUIZ III

Professional Development

40 Qs

MineCraftGodQuiz

MineCraftGodQuiz

KG - Professional Development

35 Qs

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)

Professional Development

40 Qs

367-668e9599c27f09d7ba49cf01

367-668e9599c27f09d7ba49cf01

Assessment

Quiz

Other

Professional Development

Easy

Created by

Abang Gembot

Used 3+ times

FREE Resource

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which characteristic of the attack indicates that it is not being eradicated by antimalware programs?

Stealth

Rootkit

Zero-day

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which best describes the reason for encrypting offline files?

To protect files in case of a device is lost or stolen

To control permissions on files

To be able to use TPM on files

To control shares on files

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the layers of defense in the anti-phishing and malware protection strategies developed by Microsoft is _______.

SmartScreen Filter

Malware Detector

SureBlock

Home Defense

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tunneling protocol is used to carry packets from unroutable IP addresses across a routable IP network?

GRE

PPTP

PPP

IPsec

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rule sets on firewalls is part of evaluating the _______ attack surfaces.

Spoofing

Application

Employee

Network

Server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use the dropdown menus to complete each statement regarding types of attack surfaces.

The number of running services falls under the _______ attack surface.

Spoofing

Application

Employee

Network

Server

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A junior administrator asks you what it means to harden a server. Which two statements fit the description of hardening a server?

Install new features

Disable unnecessary services

Minimize crosstalk

Place the server in a secure location

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?