98-367

98-367

10th Grade - Professional Development

21 Qs

quiz-placeholder

Similar activities

Network Security Quiz

Network Security Quiz

10th Grade

19 Qs

VPN Knowledge Quiz

VPN Knowledge Quiz

11th - 12th Grade

20 Qs

3.4C Characteristics of computing networks

3.4C Characteristics of computing networks

University

18 Qs

U.T. 4: Nivel de enlace - Protocolo Ethernet y WLAN

U.T. 4: Nivel de enlace - Protocolo Ethernet y WLAN

Professional Development

16 Qs

Designing Network Infrastructure and Network Security

Designing Network Infrastructure and Network Security

KG - University

20 Qs

UAS CCNA 3

UAS CCNA 3

University

20 Qs

(Jeremy's IT Day 2 Video) CCNA General Networking Topics

(Jeremy's IT Day 2 Video) CCNA General Networking Topics

9th - 12th Grade

20 Qs

Adresacja IP (część 2) - zaliczenie

Adresacja IP (część 2) - zaliczenie

8th - 12th Grade

21 Qs

98-367

98-367

Assessment

Quiz

Computers

10th Grade - Professional Development

Hard

Created by

Djouvens Narcisse

Used 88+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A virus does not need a carrier in order to propagate itself.

A polymorphic virus changes its code so that it cannot be detected easily.

A stealth virus hides itself in the master boot record.

2.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A stateful firewall allows only packets matching known active connections; others are rejected.

An example of a stateless firewall is an access list on a router.

Dedicated hardware firewalls are primarily stateless.

3.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Phishing is a form of online identity theft.

Antivirus apps have the latest blacklists for email addresses and domains and always keep those up to date.

Spoofing is the act of sending large amounts of unrequested emails.

4.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Application

Network

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Failed logon events

Account lockout after a reasonable number of failed logon attempts

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

DNSSEC helps prevent pharming and man-in-the-middle attacks.

DNSSEC uses a digital signature to create a chain of authority.

DNSSEC is proprietary to Microsoft Domain Name Servers.

7.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

IPSec uses digital signatures to create a chain of authority.

IPSec uses digital signatures to create a chain of authority.

IPSec is used to create a secure tunnel between two computing devices.

IPSec encrypts data packets using AH.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?