Cisco_Sem2_Mod10

Cisco_Sem2_Mod10

1st - 5th Grade

21 Qs

quiz-placeholder

Similar activities

Hari ke 3 - Kuis kodiing & Pengenalan AI

Hari ke 3 - Kuis kodiing & Pengenalan AI

1st - 12th Grade

20 Qs

4B Ch 3 Editing and Formatting in MS Word

4B Ch 3 Editing and Formatting in MS Word

4th Grade

16 Qs

Designing in Canva

Designing in Canva

5th Grade

17 Qs

Computer security threaths

Computer security threaths

1st Grade

16 Qs

VLAN dan DHCP

VLAN dan DHCP

1st Grade

20 Qs

H3CSE Quiz 1

H3CSE Quiz 1

1st Grade

25 Qs

COMPUTER NETWORK INSTALLATION MANAGEMENT

COMPUTER NETWORK INSTALLATION MANAGEMENT

1st Grade

20 Qs

Google Docs Tools

Google Docs Tools

1st - 5th Grade

20 Qs

Cisco_Sem2_Mod10

Cisco_Sem2_Mod10

Assessment

Quiz

Computers

1st - 5th Grade

Medium

Created by

Alexander Alves

Used 20+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

True or False, For about 20 years (from 1962 to 1977), the computer controlled launch code for the US nuclear missiles was 00000000

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Distributed Denial of Service (DDoS) attack?

This is an attack in which an organization’s data servers or hosts are compromised to steal confidential information

This is an attack in which an organization’s hosts are infected with malicious software that cause a variety of problems

This is an attack using a Trojan Horse

This is a coordinated attack from many devices, called zombies, with the intention of degrading or halting public access to an organization’s website and resources

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Various network security devices are required to protect the network perimeter from outside access, select All of the devices

Virtual Private Network (VPN) enabled router

Next-Generation Firewall (NGFW)

Network Access Control (NAC)

Network Internet Control (NIC)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, endpoints are particularly susceptible to malware-related attacks that originate through email or web browsing. ​

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SMTP stand for?

Simple Male Transfer Protocol

Simple Map Transfer Protocol

Simple Mail Transfiguration Protocol

Simple Mail Transfer Protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, the Cisco Web Security Appliance (WSA) is a mitigation technology for web-based threats

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

AAA stands for?

Alteration, Authorization, and Accounting

Authentication, Authorization, and Accounting

Authentication, Alteration, and Accounting

Authentication, Authorization, and Alteration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?