Quiz-7

Quiz-7

University

10 Qs

quiz-placeholder

Similar activities

KUB Training

KUB Training

University

11 Qs

Seminar Keamanan Digital

Seminar Keamanan Digital

University

15 Qs

Certified Ethical Hacker 4

Certified Ethical Hacker 4

University

10 Qs

2.3 Utility Software - RE -

2.3 Utility Software - RE -

KG - Professional Development

6 Qs

Cybersecurity 101

Cybersecurity 101

University

10 Qs

Cybersecurity Basics Quiz

Cybersecurity Basics Quiz

6th Grade - University

15 Qs

Cyber Security

Cyber Security

University

10 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

Quiz-7

Quiz-7

Assessment

Quiz

Other

University

Easy

Created by

Mahmoud Ashraf

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component is designed to protect against unauthorized communications to and from a computer?

  • port scanner

  • antimalware

  • antivirus

  • firewall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack may involve the use of tools such as nslookup and fping?

  • access attack

  • reconnaissance attack

  • denial of service attack

  • worm attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which example of malicious code would be classified as a Trojan horse?

  • malware that was written to look like a video game

  • malware that requires manual user intervention to spread between systems

  • malware that attaches itself to a legitimate program and spreads to other programs when launched

  • malware that can automatically spread from one system to another by exploiting a vulnerability in the target

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a virus and a worm?

Viruses self-replicate but worms do not.

  • Worms self-replicate but viruses do not.

  • Worms require a host file but viruses do not.

  • Viruses hide in legitimate programs but worms do not.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the network security authentication function?

  • to require users to prove who they are

  • to determine which resources a user can access

  • to keep track of the actions of a user

  • to provide challenge and response questions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What feature of SSH makes it more secure than Telnet for a device management connection?

  • confidentiality with IPsec

  • stronger password requirement

  • random one-time port connection

  • login information and data encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of an IPS?

  • detecting and blocking of attacks in real time

  • connecting global threat information to Cisco network security devices

  • authenticating and validating traffic

  • filtering of nefarious websites

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?