Networking Unit 10

Networking Unit 10

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

CYB: UNIT 1, LESSON 6 QUIZ

CYB: UNIT 1, LESSON 6 QUIZ

9th - 12th Grade

12 Qs

Hacking - Lesson 2

Hacking - Lesson 2

9th Grade

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Computer Software Prep 3

Computer Software Prep 3

9th - 12th Grade

15 Qs

Latihan PAS Informatika

Latihan PAS Informatika

10th - 12th Grade

15 Qs

Website Security

Website Security

7th - 12th Grade

10 Qs

Computer Ethics and Security

Computer Ethics and Security

9th - 12th Grade

10 Qs

10.2 Cybersecurity

10.2 Cybersecurity

9th - 12th Grade

14 Qs

Networking Unit 10

Networking Unit 10

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

WILLIAM BELIVEAU

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?

Posture assessment

Data breach

Security audit

Exploit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of DoS attack orchestrates an attack bounced off uninfected computers?

Ransomware

PDoS attack

FTP bounce

DRDoS attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

Phishing

Baiting

Quid pro quo

Tailgating

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Vulnerability

Insider threat

Denial of service

Principle of least privilege

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack relies on spoofing?

Deauth attack

Friendly DoS attack

Tailgating

Pen testing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?

Smart locker

Locking rack

Locking cabinet

Access control vestibule

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic bomb

Worm

Virus

Ransomware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?