CCNA 4 CHAPTER 1

CCNA 4 CHAPTER 1

University

11 Qs

quiz-placeholder

Similar activities

METODES Post 1

METODES Post 1

University

10 Qs

Wim Wenders

Wim Wenders

University

10 Qs

Fine Arts-Academic SB - French Revolution S6

Fine Arts-Academic SB - French Revolution S6

9th Grade - University

15 Qs

"The Arkansaw Bear" - Aurand Harris

"The Arkansaw Bear" - Aurand Harris

10th Grade - University

10 Qs

GYIC Final

GYIC Final

University - Professional Development

14 Qs

Blogs/journals

Blogs/journals

University

12 Qs

Possessive Pronouns and Adjectives

Possessive Pronouns and Adjectives

4th Grade - University

15 Qs

Possessivpronomen

Possessivpronomen

7th Grade - Professional Development

10 Qs

CCNA 4 CHAPTER 1

CCNA 4 CHAPTER 1

Assessment

Quiz

Arts

University

Easy

Created by

KEN ROLLOQUE

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
² ping sweep
DoS
spoof
DDoS

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What does the term vulnerability mean?
² a known target or victim machine
² a weakness that makes a target susceptible to an attack
² a potential threat that a hacker creates
a computer that contains sensitive information
² a method of attack to exploit a target

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
² Protect and Defend
² Securely Provision
² Oversight and Development
Analyze

4.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

1. Thwarting cyber criminals includes which of the following? (Choose two.)
hiring hackers
² shutting down the network
² sharing cyber Intelligence information
² establishing early warning systems
changing operating systems

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
DDoS
exhaustion
APT
Algorithm

6.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

medical

employment

education

flight

food

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

1. What name is given to a amateur hacker?
² script kiddie
² blue team
² red hat
² black hat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?