
CCNA1 Network Security Quiz
Authored by Kreker _
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
70 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which component is designed to protect against unauthorized communications to and from a computer?
security center
port scanner
antimalware
antivirus
firewall
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which command will block login attempts on Router A for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
Router A(config)#login block-for 10 attempts 2 within 30
Router A(config)#login block-for 30 attempts 2 within 10
Router A(config)#login block-for 2 attempts 30 within 10
Router A(config)#login block-for 30 attempts 10 within 2
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the network security accounting function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack may involve the use of tools such as nslookup and fping?
access attack
reconnaissance attack
denial of service attack
worm attack
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Match each weakness with an example. (Not all options are used.) Place the options in the following order: security policy weakness
Evaluate responses using AI:
OFF
6.
OPEN ENDED QUESTION
3 mins • 1 pt
Match the type of information security threat to the scenario. (Not all options are used.)
Evaluate responses using AI:
OFF
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which example of malicious code would be classified as a Trojan horse?
malware that was written to look like a video game
malware that requires manual user intervention to spread between systems
malware that attaches itself to a legitimate program and spreads to other programs when launched
malware that can automatically spread from one system to another by exploiting a vulnerability in the target
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
65 questions
Python - 5.பைத்தான் அறிமுகம் – மாறிகள் மற்றும் செயற்குறிகள்
Quiz
•
12th Grade
70 questions
Game Development Vocab
Quiz
•
9th - 12th Grade
71 questions
SRWE Final Exam Q's 1-60
Quiz
•
12th Grade
71 questions
TIN HỌC 6_1,2,3
Quiz
•
6th Grade - University
75 questions
computers, input output devices, software, storage, cpu
Quiz
•
9th - 12th Grade
71 questions
Câu hỏi về Cơ khí Động lực
Quiz
•
11th Grade - University
66 questions
Vic - 1.2 Memory and Storage
Quiz
•
9th - 12th Grade
70 questions
latihan soal
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade