
Exam CNSA
Authored by widi jaelani
Information Technology (IT)
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Which is the most important reason for the removal of unused, unnecessary, or unneeded protocols, services, and applications?
Increased security
Increased performance
Less need for administration
Less machine resource use
2.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Why is network security important for organizations?
It increases network speed
It protects sensitive information
It reduces electricity usage
It simplifies network configurations
3.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Which of the following best describes 'encryption'?
Speeding up data transmission
Compressing data for storage
Creating user-friendly software
Converting data into a secure code
4.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
The act of attempting to appear to be someone you're not in order to gain access to a system is known as which of the following?
Spoofing
DDoS
Replay
Sniffing
5.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Which term refers to the protection of networked systems from misuse or unauthorized access?
Network Optimization
Network Monitoring
Network Security
Network Analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Which of the following is an example of a social engineering attack?
Firewall breach
Phishing
SQL Injection
Man-in-the-Middle attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
Which of the following is considered an attack vector?
USB drive
Monitor
Keyboard
Printer
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?