Day 10 - Networking & Security I - Day 10 - 2nd Review

Day 10 - Networking & Security I - Day 10 - 2nd Review

University

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

CSC134 Chapter 8

CSC134 Chapter 8

University

17 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Administration Database

Administration Database

University - Professional Development

15 Qs

Chapter 3: Network Topology

Chapter 3: Network Topology

12th Grade - University

15 Qs

Security+

Security+

University

15 Qs

ADMIN AVANZADA WINDOWS SERVER - Test Final

ADMIN AVANZADA WINDOWS SERVER - Test Final

University

20 Qs

Bits And Bytes and All Things Nice

Bits And Bytes and All Things Nice

10th Grade - Professional Development

17 Qs

Day 10 - Networking & Security I - Day 10 - 2nd Review

Day 10 - Networking & Security I - Day 10 - 2nd Review

Assessment

Quiz

Computers

University

Medium

Created by

Rehan Ahmed

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the theme topic of Day 10 for N&S I?

Network Operations

Network Troubleshooting

Network Security Fundamentals

TACACS+

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ allows credentials to be transferred across multiple systems.

SSO

RADIUS

LDAP

TACACS+

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using TCP as its transport protocol, _____ performs authentication, authorization, and accounting as separate functions.

SSO

RADIUS

Kerberos

TACACS+

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network _____ are flaws in software or hardware that could allow an attacker to compromise the security of that network.

fluctuations

vulnerabilities

exploits

threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authorization on a network resource can only occur after successful authentication.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Illegitimate ___________ usually presents itself in the form of a pop-up.

adware

software

botware

freeware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Viruses are typically transmitted by harmless-looking software that is downloaded by users onto their computers.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?