
Networking Unit 10
Quiz
•
Computers
•
9th - 12th Grade
•
Easy
WILLIAM BELIVEAU
Used 4+ times
FREE Resource
Enhance your content
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?
Posture assessment
Data breach
Security audit
Exploit
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of DoS attack orchestrates an attack bounced off uninfected computers?
Ransomware
PDoS attack
FTP bounce
DRDoS attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Phishing
Baiting
Quid pro quo
Tailgating
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Vulnerability
Insider threat
Denial of service
Principle of least privilege
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack relies on spoofing?
Deauth attack
Friendly DoS attack
Tailgating
Pen testing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?
Smart locker
Locking rack
Locking cabinet
Access control vestibule
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Logic bomb
Worm
Virus
Ransomware
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
14 questions
Threats to computer systems and networks
Quiz
•
9th - 11th Grade
10 questions
Computer Ethics and Security
Quiz
•
9th - 12th Grade
14 questions
10.2 Cybersecurity
Quiz
•
9th - 12th Grade
10 questions
Hacking - Lesson 2
Quiz
•
9th Grade
10 questions
Understanding Cybersecurity
Quiz
•
5th Grade - Professio...
15 questions
Computer Software Prep 3
Quiz
•
9th - 12th Grade
10 questions
CyberSecurity Basics
Quiz
•
6th - 12th Grade
15 questions
ICT
Quiz
•
9th - 11th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)
Quiz
•
9th Grade
15 questions
MLA Formatting
Quiz
•
9th Grade
20 questions
Typing Practice
Quiz
•
7th - 12th Grade
14 questions
Inputs and Outputs: Computer Science Intro
Lesson
•
5th - 9th Grade
20 questions
Google Sheets Quiz
Quiz
•
9th Grade