Module 3

Module 3

1st Grade

12 Qs

quiz-placeholder

Similar activities

Chapter 7 - IP Addressing_ITN

Chapter 7 - IP Addressing_ITN

KG - University

17 Qs

Cyber Security Quiz

Cyber Security Quiz

1st - 5th Grade

10 Qs

Lesson 4 - Review

Lesson 4 - Review

1st - 3rd Grade

10 Qs

Common Windows Features

Common Windows Features

KG - University

12 Qs

47-56 NETWORK+

47-56 NETWORK+

1st Grade

10 Qs

IoT Quiz Chapter 1

IoT Quiz Chapter 1

1st Grade

10 Qs

VPN

VPN

1st - 3rd Grade

8 Qs

CompTIA+N10-008  (231-245)

CompTIA+N10-008 (231-245)

1st Grade

15 Qs

Module 3

Module 3

Assessment

Quiz

Computers

1st Grade

Easy

Created by

who areyou

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary means for mitigating virus and Trojan horse attacks?

blocking ICMP echo and echo-replies

encryption

antisniffer software

antivirus software

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three items are components of the CIA triad? (Choose three.)

integrity

availability

confidentiality

intervention

scalability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security implementation will provide control plane protection for a network device?

encryption for remote access connections

NTP for consistent timestamps on logging messages

routing protocol authentication

AAA for authenticating management access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What threat intelligence group provides blogs and podcasts to help network security professionals remain effective and up-to-date

FireEye

Talos

CybOX

Mitre

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

statement of scope

identification and authentication policy

acceptable use policy

statement of authority

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What worm mitigation phase involves actively disinfecting infected systems?

Quarantine

Inoculation

Containment

Treatment

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?

Lettuce

Artichoke

Onion

Cabbage

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?