Module-16-17

Module-16-17

37 Qs

quiz-placeholder

Similar activities

Chapter 5 Networking Essentials

Chapter 5 Networking Essentials

KG - University

35 Qs

KPS Physical Education Concepts Exam

KPS Physical Education Concepts Exam

KG - University

35 Qs

MCQ_UNIT 1

MCQ_UNIT 1

KG - University

33 Qs

Mid Term Examination for Class IV 2024

Mid Term Examination for Class IV 2024

KG - University

35 Qs

EOUT -  9.1 Cybersecurity

EOUT - 9.1 Cybersecurity

8th Grade

37 Qs

ENSA 64-103 MC & SC

ENSA 64-103 MC & SC

1st Grade

39 Qs

Class - X : Cyber Security  40 Marks

Class - X : Cyber Security 40 Marks

10th Grade

40 Qs

Module-16-17

Module-16-17

Assessment

Quiz

others

Hard

Created by

Khoa Đỗ

FREE Resource

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component is designed to protect against unauthorized communications to and from a computer?
security center
port scanner
antimalware
antivirus
firewall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
login block-for 10 attempts 2 within 30
login block-for 30 attempts 2 within 10
login block-for 2 attempts 30 within 10
login block-for 30 attempts 10 within 2

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the network security accounting function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which example of malicious code would be classified as a Trojan horse?
malware that was written to look like a video game
malware that requires manual user intervention to spread between systems
malware that attaches itself to a legitimate program and spreads to other programs when launched
malware that can automatically spread from one system to another by exploiting a vulnerability in the target

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a virus and a worm?
Viruses self-replicate but worms do not.
Worms self-replicate but viruses do not.
Worms require a host file but viruses do not.
Viruses hide in legitimate programs but worms do not.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves a compromise of data that occurs between two end points?
denial-of-service
man-in-the-middle attack
extraction of security parameters
username enumeration

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities?
reconnaissance
DoS
dictionary
man-in-the-middle

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?