Search Header Logo

1414-Ch. 16 Network Security Fundamentals Review

Authored by Wayground Content

Computers

12th Grade

Used 24+ times

1414-Ch. 16  Network Security Fundamentals Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

information theft

data loss or manipulation

identify theft

disruption of service

2.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

information theft

data loss or manipulation

identify theft

disruption of service

3.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which component is designed to protect against unauthorized communications to and from a computer?

antimalware

antivirus

security center

firewall

port scanner

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?

frequency

storage

security

validation

5.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What kind of threat is described when a network is malicously overloaded with data traffic to deny other users network access?

information theft

data loss or manipulation

identify theft

disruption of service

6.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah’s computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?

access attack

denial of service (DoS) attack

malware attack

reconnaissance attack

7.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is one of the most effective security tools available for protecting users from external threats?

firewalls

password encryption techniques

patch servers

router that runs AAA services

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?