Modules 16 – 17
Quiz
•
Instructional Technology
•
1st - 5th Grade
•
Practice Problem
•
Medium
Rambo Cali
Used 5+ times
FREE Resource
Enhance your content in a minute
62 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which component is designed to protect against unauthorized communications to and from a computer?
security center
port scanner
antimalware
antivirus
firewall
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
RouterA(config)# login block-for 10 attempts 2 within 30
RouterA(config)# login block-for 30 attempts 2 within 10
RouterA(config)# login block-for 2 attempts 30 within 10
RouterA(config)# login block-for 30 attempts 10 within 2
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the purpose of the network security accounting function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What type of attack may involve the use of tools such as nslookup and fping?
access attack
reconnaissance attack
denial of service attack
worm attack
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which example of malicious code would be classified as a Trojan horse?
malware that was written to look like a video game
malware that requires manual user intervention to spread between systems
malware that attaches itself to a legitimate program and spreads to other programs when launched
malware that can automatically spread from one system to another by exploiting a vulnerability in the target
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the difference between a virus and a worm?
Viruses self-replicate but worms do not.
Worms self-replicate but viruses do not.
Worms require a host file but viruses do not.
Viruses hide in legitimate programs but worms do not.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which attack involves a compromise of data that occurs between two end points?
denial-of-service
man-in-the-middle attack
extraction of security parameters
username enumeration
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
60 questions
Công nghệ 5 HKII
Quiz
•
5th Grade
65 questions
Soal TIK kelas 4 - Ms. Word
Quiz
•
4th Grade
60 questions
B456 HP1
Quiz
•
1st - 5th Grade
59 questions
Câu 61 p4 -> Câu 10p5
Quiz
•
1st Grade
65 questions
Juniper Security
Quiz
•
1st - 2nd Grade
60 questions
UD3: MATERIALES DE CONSTRUCCION
Quiz
•
5th Grade
65 questions
Công nghệ lớp 3 HK2
Quiz
•
3rd Grade - University
65 questions
CÔNG NGHỆ 12
Quiz
•
1st Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
Discover more resources for Instructional Technology
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
7 questions
Veteran's Day
Interactive video
•
3rd Grade
10 questions
Area
Quiz
•
3rd Grade
8 questions
Ancient China Quick Check
Quiz
•
3rd Grade
14 questions
States of Matter
Lesson
•
KG - 3rd Grade
