
Chapter 9 Review Practice Quiz
Authored by Ankur Chattopadhyay
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following is a technique you can use to help secure a wireless network? (Choose all that apply.)
IP subnetting
MAC address filtering
WPA3
SSID broadcast
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of these protocols is used for VPNs? (Choose all that apply.)
PPTP
WEP
SSTP
L2TP
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do virtual private networks ensure privacy?
Tunneling
Concentrating
Encapsulating
Authenticating
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets sothat the server can’t respond to normal traffic?
DDR
ICMP
Dos
Worm
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a guideline for
creating a security policy?
A security policy should be cryptic so
that attackers can’t understand it.
A security policy should be general
enough so that rules can be added as
needed.
A security policy should be
enforceable.
A security policy should have
different provisions depending on the
user.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following is a component of
a security policy? (Choose all that apply.)
Authentication policy
Privacy policy
Network configuration policy
Computer specification policy
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which procedure specifies what
resources users can access and the tasks they can perform on a network?
Authentication
Auditing
Authorization
Logon
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?