Chapter 6 Network Security and Risk Analysis Quiz

Chapter 6 Network Security and Risk Analysis Quiz

12th Grade

17 Qs

quiz-placeholder

Similar activities

Networking Scenarios

Networking Scenarios

9th - 12th Grade

20 Qs

INTERNET CONNECTION

INTERNET CONNECTION

12th Grade

13 Qs

Chapter 3.4 SEC+ Review

Chapter 3.4 SEC+ Review

9th - 12th Grade

12 Qs

Information Technology Acronyms for GenCyber

Information Technology Acronyms for GenCyber

6th - 12th Grade

15 Qs

D4 WorkBook - Quizzez

D4 WorkBook - Quizzez

12th Grade

12 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

Operating Systems

Operating Systems

8th - 12th Grade

16 Qs

Internet terminology

Internet terminology

10th - 12th Grade

14 Qs

Chapter 6 Network Security and Risk Analysis Quiz

Chapter 6 Network Security and Risk Analysis Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Stella Lai

Used 1+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is asked to perform a risk analysis of a company. The user asks for the company asset database that contains a list of all equipment.The user uses this information as part of a risk analysis. Which type of risk analysis could be performed?

exposure factor

hardware

quantitative

qualitative

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user is evaluating the network infrastructure of a company. The user noted many redundant systems and devices in place, but no overall evaluation of the network. In a report, the user emphasized the methods and configurations needed as a whole to make the network fault tolerant. What is the type of design the user is stressing?

comprehensive

spanning tree

resilient

availability

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A user has completed a six month project to identify all data locations and catalog the location. The next step is to classify the data and produce some criteria on data sensitivity. Which two steps can the user take to classify the data? (Choose two.)

Identify sensitivity of the data.

Determine how often data is backed up.

Determine the user of the data.

Treat all the data the same.

Establish the owner of the data.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A user needs to add redundancy to the routers in a company. What are the three options the user can use? (Choose three.)

IPFIX

STP

VRRP

HSRP

GLBP

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A user is asked to evaluate the data center to improve availability for customers. The user notices that there is only one ISP connection, some of the equipment is out of warranty, there are no spare parts, and no one was monitoring the UPS which was tripped twice in one month. Which three deficiencies in high availability has the user identified? (Choose three.)

failure to prevent security incidents

single points of failure

failure to detect errors as they occur

failure to protect against poor maintenance

failure to design for reliability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network?

NAC

IPS

IDS

firewall

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A user is a consultant who is hired to prepare a report to Congress as to which industries should be required to maintain five nine availability. Which three industries should the user include in a report? (Choose three.)

food service

healthcare

finance

education

public safety

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?