98-367

98-367

10th Grade - Professional Development

21 Qs

quiz-placeholder

Similar activities

Information and cyber security Quiz.

Information and cyber security Quiz.

Professional Development

25 Qs

UNIT-IV: E-mail and IP Security

UNIT-IV: E-mail and IP Security

University

25 Qs

3.4C Characteristics of computing networks

3.4C Characteristics of computing networks

University

18 Qs

Windows Active Directory

Windows Active Directory

University - Professional Development

19 Qs

Understanding the Threat to Digital Systems

Understanding the Threat to Digital Systems

10th Grade

20 Qs

Designing Network Infrastructure and Network Security

Designing Network Infrastructure and Network Security

KG - University

20 Qs

IP Sec

IP Sec

University

18 Qs

Network Security 2

Network Security 2

University

21 Qs

98-367

98-367

Assessment

Quiz

Computers

10th Grade - Professional Development

Hard

Created by

Djouvens Narcisse

Used 88+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A virus does not need a carrier in order to propagate itself.

A polymorphic virus changes its code so that it cannot be detected easily.

A stealth virus hides itself in the master boot record.

2.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

A stateful firewall allows only packets matching known active connections; others are rejected.

An example of a stateless firewall is an access list on a router.

Dedicated hardware firewalls are primarily stateless.

3.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Phishing is a form of online identity theft.

Antivirus apps have the latest blacklists for email addresses and domains and always keep those up to date.

Spoofing is the act of sending large amounts of unrequested emails.

4.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Application

Network

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

Failed logon events

Account lockout after a reasonable number of failed logon attempts

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

DNSSEC helps prevent pharming and man-in-the-middle attacks.

DNSSEC uses a digital signature to create a chain of authority.

DNSSEC is proprietary to Microsoft Domain Name Servers.

7.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Media Image

IPSec uses digital signatures to create a chain of authority.

IPSec uses digital signatures to create a chain of authority.

IPSec is used to create a secure tunnel between two computing devices.

IPSec encrypts data packets using AH.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?