Search Header Logo

Domain 4 Network Security

Authored by Wayground Content

Information Technology (IT)

12th Grade

Domain 4 Network Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involved the attacker impersonaing both sides of a conversation between 2 hosts?

On-path attack

Deauthentication

DoS

Spoofing

Answer explanation

An on-path attack, also known as a man-in-the-middle, MiTM attack allows the attacker to impersonate both parties involved in a network conversation.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security concept dictates that a user be given only the permission to perform their job?

Zero trust

Role-based access

Least privilege

Defense in depth

Answer explanation

The principle of least privilege dictates that a user be given the least permission to perform their job.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle describes the process of verification of a user's identity?

Authentication

Authorization

Accounting

Auditing

Answer explanation

Authentication is the process of verification of a user's identify.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack can be used on a native VLAN?

Double-tagging

VLAN traversal

Truck popping

Denial of Service

Answer explanation

Double-tagging in an attack that can be sued against the native VLAN. The attacker will tage the natvie VLAN on a fram and then tag another inside that fram for the VLAN that the attacker intends to compromise.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which console-based management protocol has built-in security?

SSH

SCP

HTTPS

FTP

Answer explanation

Secure Shell (SSH) negotiates encryption when a connection is made.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication system is an open standard originally proposed by the Internet Engineering Task Force (IETF)?

RADIUS

TACACS+

Kerberos

LDAP

Answer explanation

Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and because an open standard for authentication, often used with 802.1X.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of social engineering is nothing more than lookin gover someone's shoulder while they enter or view sensitive information?

Shoulder surfing

Phishing

Tailgating

Whaling

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?