
Chapter 3.4 SEC+ Review
Authored by Kai Grant
Computers
9th - 12th Grade
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Make sure that remote access connections are secure
Prepare to document
Map your network
Protect your network
Reach your network
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Create a list of all protocols being used on the network
Prepare to document
Map your network
Protect your network
Reach your network
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Identify the choke points on the network
Prepare to document
Map your network
Protect your network
Reach your network
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Use timestamps on all documents
Prepare to document
Map your network
Protect your network
Reach your network
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Create a list of all devices
Prepare to document
Map your network
Protect your network
Reach your network
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Remove insecure protocols
Control your network
Manage your network
Protect your network
Reach your network
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Implement the principle of least privilege
Control your network
Manage your network
Protect your network
Reach your network
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?