Domain 4 Network Security

Quiz
•
Information Technology (IT)
•
12th Grade
•
Hard
Quizizz Content
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involved the attacker impersonaing both sides of a conversation between 2 hosts?
On-path attack
Deauthentication
DoS
Spoofing
Answer explanation
An on-path attack, also known as a man-in-the-middle, MiTM attack allows the attacker to impersonate both parties involved in a network conversation.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security concept dictates that a user be given only the permission to perform their job?
Zero trust
Role-based access
Least privilege
Defense in depth
Answer explanation
The principle of least privilege dictates that a user be given the least permission to perform their job.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle describes the process of verification of a user's identity?
Authentication
Authorization
Accounting
Auditing
Answer explanation
Authentication is the process of verification of a user's identify.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which attack can be used on a native VLAN?
Double-tagging
VLAN traversal
Truck popping
Denial of Service
Answer explanation
Double-tagging in an attack that can be sued against the native VLAN. The attacker will tage the natvie VLAN on a fram and then tag another inside that fram for the VLAN that the attacker intends to compromise.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which console-based management protocol has built-in security?
SSH
SCP
HTTPS
FTP
Answer explanation
Secure Shell (SSH) negotiates encryption when a connection is made.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication system is an open standard originally proposed by the Internet Engineering Task Force (IETF)?
RADIUS
TACACS+
Kerberos
LDAP
Answer explanation
Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and because an open standard for authentication, often used with 802.1X.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which form of social engineering is nothing more than lookin gover someone's shoulder while they enter or view sensitive information?
Shoulder surfing
Phishing
Tailgating
Whaling
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
latsol PH Informatika kelas 11 Jarkom

Quiz
•
11th Grade - University
15 questions
Quis bab 1-3

Quiz
•
12th Grade
15 questions
Exploring Digital Transformation and IoT

Quiz
•
12th Grade
20 questions
Networking Protocols Quiz

Quiz
•
12th Grade
20 questions
LATIHAN PSAJ DPK TJKT

Quiz
•
12th Grade
25 questions
OJM 3 - 2024

Quiz
•
12th Grade
20 questions
ASAS GANJIL MATERI FIBER OPTIC

Quiz
•
12th Grade
20 questions
ASSESMEN SUMATIF 1 KELAS XI - JARINGAN KOMPUTER & INTERNET-

Quiz
•
11th Grade - University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade