MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

quiz-placeholder

Similar activities

DPS Jorhat - Robotics Skill Assessment

DPS Jorhat - Robotics Skill Assessment

6th - 8th Grade

20 Qs

12AIT - All About W3C <3

12AIT - All About W3C <3

10th Grade - University

18 Qs

Informatika_Kelas 8

Informatika_Kelas 8

8th Grade

20 Qs

¿Qué es un sistema operativo?

¿Qué es un sistema operativo?

10th Grade

19 Qs

Schoolpoortquiz Altena

Schoolpoortquiz Altena

1st Grade - University

16 Qs

BERLATIH SOAL PPPK Part 2

BERLATIH SOAL PPPK Part 2

Professional Development

15 Qs

Pengantar Teknologi Informasi 8

Pengantar Teknologi Informasi 8

University

17 Qs

IDE Tema 2

IDE Tema 2

University

15 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

Assessment

Quiz

Education, Professional Development, Computers

KG - Professional Development

Medium

Created by

Sean H278

Used 157+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To implement WPA2 Enterprise, you would need a/an

RADIUS server

SSL server

WEP server

VPN server

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Active Directory controls, enforces, and assigns security policies and access rights for all users. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

NTFS permissions

User Account Control

Registry

No change is needed

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Role separation improves server security by

Enforcing principle of least privilege

Installing applications on separate hard disks

Physically separating high security servers from other servers

Placing servers on separate VLANs

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Media Image

select picture

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Dumpster diving refers to a physical threat that a hacker might use to look for information about a computer network. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.

Phishing

Malware

Reverse Social engineering

No change is needed

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Password history policies are used to prevent:

Brute force attacks

Users from sharing passwords

Social engineering

Passwords from being reused immediately

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the standard or basic collection of NTFS permissions?

Read and execute, read, write, full control, modify, list folder contents

Change permissions, read permissions, write permissions

Read attributes, list folder/read data, traverse folder/execute file

Create files/write data, create folders/append data, take ownership

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?