
1414-Ch. 16 Network Security Fundamentals Review
Authored by Wayground Content
Computers
12th Grade
Used 24+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
information theft
data loss or manipulation
identify theft
disruption of service
2.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
information theft
data loss or manipulation
identify theft
disruption of service
3.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
Which component is designed to protect against unauthorized communications to and from a computer?
antimalware
antivirus
security center
firewall
port scanner
4.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?
frequency
storage
security
validation
5.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
What kind of threat is described when a network is malicously overloaded with data traffic to deny other users network access?
information theft
data loss or manipulation
identify theft
disruption of service
6.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah’s computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?
access attack
denial of service (DoS) attack
malware attack
reconnaissance attack
7.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
What is one of the most effective security tools available for protecting users from external threats?
firewalls
password encryption techniques
patch servers
router that runs AAA services
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?