Cybersecurity Midterm

Cybersecurity Midterm

9th - 12th Grade

93 Qs

quiz-placeholder

Similar activities

Quis Siang

Quis Siang

9th - 12th Grade

93 Qs

Scratch Game development camp-1

Scratch Game development camp-1

1st - 9th Grade

93 Qs

OCR GCSE Computer Science - J276 1.1 - 1.7

OCR GCSE Computer Science - J276 1.1 - 1.7

KG - Professional Development

91 Qs

GCSE Computer Science - Paper 2 (Algorithms & Programming)

GCSE Computer Science - Paper 2 (Algorithms & Programming)

12th Grade

89 Qs

EHE Module 03: Information Security Threats

EHE Module 03: Information Security Threats

12th Grade

93 Qs

Jaringan Komputer dan Internet

Jaringan Komputer dan Internet

11th Grade

88 Qs

DROP EVERYTHING AND CHECK

DROP EVERYTHING AND CHECK

12th Grade

90 Qs

DA 1st Quarter Review

DA 1st Quarter Review

9th Grade

89 Qs

Cybersecurity Midterm

Cybersecurity Midterm

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Easy

Created by

Joseph Gilliam

Used 36+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

93 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?

Configure account lockout in Group Policy.

Configure account policies in Group Policy.

Configure account expiration in the user accounts.

Configure day/time restrictions in the user accounts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Microsoft tool can be used to review a system's security configuration against recommended settings?

Microsoft Security Compliance Toolkit

Registry Editor

Microsoft Internet Explorer

Windows Defender

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of update should be prioritized even outside of a normal patching window?

Microsoft updates

Security updates

Critical updates

Monthly updates

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following makes this documentation more useful? (select 3)

Have a printed hard copy kept in a secure location.

Identify the choke points on the network.

Automate administration as much as possible.

Identify who is responsible for each device.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)

WSUS

Security Templates

Group Policy

Security Configuration and Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a configuration baseline?

A list of common security settings that a group or all devices share

A collection of security settings that can be automatically applied to a device

A set of performance statistics that identifies normal operating performance

The minimum services required for a server to function

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By definition, what is the process of reducing security exposure and tightening security controls?

Hardening

Passive reconnaissance

Social engineering

Active scanning

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?