Exam CNSA

Exam CNSA

University

35 Qs

quiz-placeholder

Similar activities

Quiz-Applied OS

Quiz-Applied OS

University

40 Qs

 Internet Basics Quiz

Internet Basics Quiz

6th Grade - University

30 Qs

Networking Week 6

Networking Week 6

3rd Grade - University

39 Qs

Re Assessment

Re Assessment

University

35 Qs

Long Quiz # 2 System Administration Activities

Long Quiz # 2 System Administration Activities

University

40 Qs

Câu hỏi về mô hình OSI và TCP/IP

Câu hỏi về mô hình OSI và TCP/IP

University

32 Qs

Informatique - Acronymes

Informatique - Acronymes

University

35 Qs

Exam CNSA

Exam CNSA

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

widi jaelani

Used 1+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which is the most important reason for the removal of unused, unnecessary, or unneeded protocols, services, and applications?

Increased security

Increased performance

Less need for administration

Less machine resource use

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Why is network security important for organizations?

It increases network speed

It protects sensitive information

It reduces electricity usage

It simplifies network configurations

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following best describes 'encryption'?

Speeding up data transmission

Compressing data for storage

Creating user-friendly software

Converting data into a secure code

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The act of attempting to appear to be someone you're not in order to gain access to a system is known as which of the following?

Spoofing

DDoS

Replay

Sniffing

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which term refers to the protection of networked systems from misuse or unauthorized access?

Network Optimization

Network Monitoring

Network Security

Network Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is an example of a social engineering attack?

Firewall breach

Phishing

SQL Injection

Man-in-the-Middle attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is considered an attack vector?

USB drive

Monitor

Keyboard

Printer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?