Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?
Resiliency and Site Security

Quiz
•
Computers
•
9th Grade
•
Medium
Carlos Sowell
Used 7+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Biometric locks
Keypad locks
Smart card
Proximity card
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?
Pass-the-hash attack
Password sniffing
Brute force attack
Keylogger
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which passive reconnaissance tool is used to gather information from a variety of public sources?
theHarvester
scanless
Shodan
Packet sniffing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?
Nessus
Wireshark
nmap
OVAL
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company CEO is upset after receiving a call from a reporter at a local news station that the company is apparently at a launching point for a massive attack. The reporter provided detailed IP logs, and the network team reviewed them but could not find similar entries. What could be a possible explanation for the different records?
DNS-based on-path attack
DNS attack indicators
DNS poisoning
DNS client cache poisoning
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network?
Port mirroring
MAC spoofing
ARP poisoning
MAC flooding
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?
Network-based firewall
Host-based firewall
Signature-based IDS
Antivirus scanner
Anomaly-based IDS
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Computer Networks Review

Quiz
•
9th - 12th Grade
20 questions
Computer Network - Internet

Quiz
•
10th - 12th Grade
20 questions
GCSE Computer Science 1.4 - Wired and Wireless Networks

Quiz
•
9th - 10th Grade
21 questions
Domain 1 - Networking

Quiz
•
10th Grade
20 questions
Ethical Hacking

Quiz
•
University
20 questions
BTEC IT Revision Quiz 2 (various topics)

Quiz
•
8th - 11th Grade
21 questions
client server

Quiz
•
10th - 11th Grade
20 questions
202309 BMIT27x3 Revision Quiz 2

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University