Domain 4 Network Security

Domain 4 Network Security

12th Grade

20 Qs

quiz-placeholder

Similar activities

CM- U1L3 -  Windows OS Security Features

CM- U1L3 - Windows OS Security Features

10th Grade - University

20 Qs

ASAS GANJIL MATERI FIBER OPTIC

ASAS GANJIL MATERI FIBER OPTIC

12th Grade

20 Qs

Understanding Access Control Lists

Understanding Access Control Lists

12th Grade

15 Qs

Security Measures Quiz

Security Measures Quiz

12th Grade

15 Qs

Networking Acronyms

Networking Acronyms

12th Grade

20 Qs

Lesson 1: System Attacks and External Threats

Lesson 1: System Attacks and External Threats

9th - 12th Grade

15 Qs

Mastering Express JS Concepts

Mastering Express JS Concepts

12th Grade - University

15 Qs

PTS Genap Informatika Kelas XII

PTS Genap Informatika Kelas XII

12th Grade - University

20 Qs

Domain 4 Network Security

Domain 4 Network Security

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Quizizz Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involved the attacker impersonaing both sides of a conversation between 2 hosts?

On-path attack

Deauthentication

DoS

Spoofing

Answer explanation

An on-path attack, also known as a man-in-the-middle, MiTM attack allows the attacker to impersonate both parties involved in a network conversation.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security concept dictates that a user be given only the permission to perform their job?

Zero trust

Role-based access

Least privilege

Defense in depth

Answer explanation

The principle of least privilege dictates that a user be given the least permission to perform their job.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle describes the process of verification of a user's identity?

Authentication

Authorization

Accounting

Auditing

Answer explanation

Authentication is the process of verification of a user's identify.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack can be used on a native VLAN?

Double-tagging

VLAN traversal

Truck popping

Denial of Service

Answer explanation

Double-tagging in an attack that can be sued against the native VLAN. The attacker will tage the natvie VLAN on a fram and then tag another inside that fram for the VLAN that the attacker intends to compromise.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which console-based management protocol has built-in security?

SSH

SCP

HTTPS

FTP

Answer explanation

Secure Shell (SSH) negotiates encryption when a connection is made.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication system is an open standard originally proposed by the Internet Engineering Task Force (IETF)?

RADIUS

TACACS+

Kerberos

LDAP

Answer explanation

Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and because an open standard for authentication, often used with 802.1X.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of social engineering is nothing more than lookin gover someone's shoulder while they enter or view sensitive information?

Shoulder surfing

Phishing

Tailgating

Whaling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?