Domain 4 Network Security

Quiz
•
Information Technology (IT)
•
12th Grade
•
Hard
Wayground Content
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involved the attacker impersonaing both sides of a conversation between 2 hosts?
On-path attack
Deauthentication
DoS
Spoofing
Answer explanation
An on-path attack, also known as a man-in-the-middle, MiTM attack allows the attacker to impersonate both parties involved in a network conversation.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security concept dictates that a user be given only the permission to perform their job?
Zero trust
Role-based access
Least privilege
Defense in depth
Answer explanation
The principle of least privilege dictates that a user be given the least permission to perform their job.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle describes the process of verification of a user's identity?
Authentication
Authorization
Accounting
Auditing
Answer explanation
Authentication is the process of verification of a user's identify.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which attack can be used on a native VLAN?
Double-tagging
VLAN traversal
Truck popping
Denial of Service
Answer explanation
Double-tagging in an attack that can be sued against the native VLAN. The attacker will tage the natvie VLAN on a fram and then tag another inside that fram for the VLAN that the attacker intends to compromise.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which console-based management protocol has built-in security?
SSH
SCP
HTTPS
FTP
Answer explanation
Secure Shell (SSH) negotiates encryption when a connection is made.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication system is an open standard originally proposed by the Internet Engineering Task Force (IETF)?
RADIUS
TACACS+
Kerberos
LDAP
Answer explanation
Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and because an open standard for authentication, often used with 802.1X.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which form of social engineering is nothing more than lookin gover someone's shoulder while they enter or view sensitive information?
Shoulder surfing
Phishing
Tailgating
Whaling
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Quiz Jaringan Komputer

Quiz
•
12th Grade
15 questions
8-klass informatika

Quiz
•
8th Grade - University
25 questions
OJM 3 - 2024

Quiz
•
12th Grade
15 questions
Exploring Digital Transformation and IoT

Quiz
•
12th Grade
18 questions
Quiz Topologi Jaringan Komputer

Quiz
•
12th Grade
25 questions
UH_TIK (XI)

Quiz
•
11th Grade - University
15 questions
Networking Standards: OSI and TCP/IP Models Quiz

Quiz
•
12th Grade
25 questions
MJO25 - C567.1-25soal

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
20 questions
Getting to know YOU icebreaker activity!

Quiz
•
6th - 12th Grade
10 questions
Impact of 9/11 and the War on Terror

Interactive video
•
10th - 12th Grade
28 questions
Ser vs estar

Quiz
•
9th - 12th Grade
6 questions
Biography

Quiz
•
4th - 12th Grade
25 questions
ServSafe Foodhandler Part 3 Quiz

Quiz
•
9th - 12th Grade
10 questions
Fact Check Ice Breaker: Two truths and a lie

Quiz
•
5th - 12th Grade
20 questions
Macromolecules

Quiz
•
9th - 12th Grade