CompTIA Network+ N10-008 Chapter 13

CompTIA Network+ N10-008 Chapter 13

University

13 Qs

quiz-placeholder

Similar activities

Cross-Site Scripting

Cross-Site Scripting

University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

Information Technology

Information Technology

12th Grade - University

15 Qs

Week 14 - Module 5 Unit 5 Behavioral Security Concepts

Week 14 - Module 5 Unit 5 Behavioral Security Concepts

University

18 Qs

Software Defined Networking

Software Defined Networking

University

10 Qs

Computer Networks Assignment : 1

Computer Networks Assignment : 1

University

15 Qs

AAA Security and Access Management Quiz

AAA Security and Access Management Quiz

11th Grade - University

15 Qs

Topologies

Topologies

University

13 Qs

CompTIA Network+ N10-008 Chapter 13

CompTIA Network+ N10-008 Chapter 13

Assessment

Quiz

Computers

University

Hard

Created by

Christopher Wilson

Used 46+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You’re doing network consulting for a small research firm, and there’s more paperwork to the deal than you ever expected. Of the documents you have to sign, which one covers your obligations to protect any trade secrets or proprietary information they share with you?
BPA
MOU
NDA
SLA

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is most likely to be part of an AUP?
How often employee evaluations should be conducted
What to do when a workstation shows signs of malware infection
Whether you can access streaming music services from your workstation
Who is in charge of a critical database

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Your company allows users to use their smartphones for company business and join them to the office network. After several security incidents, management is considering a new policy that involves company-issued phones. What term describes the original policy?
BYOD
COBO
COPE
CYOD

4.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

You’ve been asked to bring an old password policy in compliance with current best practices and NIST recommendations. Which of the following current rules should be changed?
Newly created passwords are checked against the current list of known weak passwords.
Passwords must be changed at least every 90 days.
Passwords must never be emailed, printed, or written down.
Passwords should be at least six characters.
Passwords that have been changed should never be reused.

5.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

You’re designing a set of role-based policy documents for different people in your company. Which of the following should definitely be in policies for managerial staff?
A complete list of technical standards used in the network
A list of who is responsible for which network assets
Legal and regulatory requirements applicable to company IT functions
Procedures for conducting a server backup
Procedures for revising or changing security policies

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is true of a work instruction but not a standard operating procedure?
Defines what criteria must be met to complete the task successfully
Defines who is responsible for each step of the operation
Leaves little room for error or interpretation
Provides a step by step procedure for completing a task

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following network documents is likely to go longest without major changes?
Logical network diagram
Physical network diagram
Site survey report
Wiring diagram

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?