Domain 4 Network Security

Domain 4 Network Security

12th Grade

20 Qs

quiz-placeholder

Similar activities

Cyber 1 Networking FINAL

Cyber 1 Networking FINAL

9th - 12th Grade

20 Qs

Konfigurasi Dasar MikroTik

Konfigurasi Dasar MikroTik

12th Grade - University

20 Qs

Nmap Quiz

Nmap Quiz

9th - 12th Grade

15 Qs

Exploring Computer Networking Concepts

Exploring Computer Networking Concepts

12th Grade

15 Qs

KT O4

KT O4

12th Grade

18 Qs

Lesson 1: Online Services

Lesson 1: Online Services

9th - 12th Grade

15 Qs

The Role of IETF & Network Protocols

The Role of IETF & Network Protocols

10th Grade - University

15 Qs

Domain 4 Network Security

Domain 4 Network Security

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Quizizz Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involved the attacker impersonaing both sides of a conversation between 2 hosts?

On-path attack

Deauthentication

DoS

Spoofing

Answer explanation

An on-path attack, also known as a man-in-the-middle, MiTM attack allows the attacker to impersonate both parties involved in a network conversation.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security concept dictates that a user be given only the permission to perform their job?

Zero trust

Role-based access

Least privilege

Defense in depth

Answer explanation

The principle of least privilege dictates that a user be given the least permission to perform their job.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle describes the process of verification of a user's identity?

Authentication

Authorization

Accounting

Auditing

Answer explanation

Authentication is the process of verification of a user's identify.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack can be used on a native VLAN?

Double-tagging

VLAN traversal

Truck popping

Denial of Service

Answer explanation

Double-tagging in an attack that can be sued against the native VLAN. The attacker will tage the natvie VLAN on a fram and then tag another inside that fram for the VLAN that the attacker intends to compromise.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which console-based management protocol has built-in security?

SSH

SCP

HTTPS

FTP

Answer explanation

Secure Shell (SSH) negotiates encryption when a connection is made.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication system is an open standard originally proposed by the Internet Engineering Task Force (IETF)?

RADIUS

TACACS+

Kerberos

LDAP

Answer explanation

Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and because an open standard for authentication, often used with 802.1X.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of social engineering is nothing more than lookin gover someone's shoulder while they enter or view sensitive information?

Shoulder surfing

Phishing

Tailgating

Whaling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)