Exam CNSA

Exam CNSA

University

35 Qs

quiz-placeholder

Similar activities

Quiztronic

Quiztronic

University

40 Qs

Encryption/Decryption

Encryption/Decryption

University

40 Qs

ИНФР 61-90

ИНФР 61-90

University

30 Qs

EMPOWERMENT TECH

EMPOWERMENT TECH

11th Grade - University

30 Qs

ITE 292 P3 Exam

ITE 292 P3 Exam

University

37 Qs

ICT CHAPTER 1

ICT CHAPTER 1

University

31 Qs

MIDTERMS REVIEWER NETWORKING

MIDTERMS REVIEWER NETWORKING

University

40 Qs

MODULE 2 - (FOR SALE!) luh monetized yarn

MODULE 2 - (FOR SALE!) luh monetized yarn

University

39 Qs

Exam CNSA

Exam CNSA

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

widi jaelani

Used 1+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which is the most important reason for the removal of unused, unnecessary, or unneeded protocols, services, and applications?

Increased security

Increased performance

Less need for administration

Less machine resource use

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Why is network security important for organizations?

It increases network speed

It protects sensitive information

It reduces electricity usage

It simplifies network configurations

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following best describes 'encryption'?

Speeding up data transmission

Compressing data for storage

Creating user-friendly software

Converting data into a secure code

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The act of attempting to appear to be someone you're not in order to gain access to a system is known as which of the following?

Spoofing

DDoS

Replay

Sniffing

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which term refers to the protection of networked systems from misuse or unauthorized access?

Network Optimization

Network Monitoring

Network Security

Network Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is an example of a social engineering attack?

Firewall breach

Phishing

SQL Injection

Man-in-the-Middle attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is considered an attack vector?

USB drive

Monitor

Keyboard

Printer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)