Cybersecurity Midterm

Cybersecurity Midterm

9th - 12th Grade

93 Qs

quiz-placeholder

Similar activities

Principles of IT -Fall Exam

Principles of IT -Fall Exam

9th - 12th Grade

92 Qs

Electronics I PreTest

Electronics I PreTest

9th - 12th Grade

98 Qs

Computer Science - Paper 2

Computer Science - Paper 2

12th Grade

90 Qs

EverFi Ignition 1-2

EverFi Ignition 1-2

9th - 12th Grade

88 Qs

Computing year 11

Computing year 11

11th Grade

90 Qs

ICT - Baseline Year 10

ICT - Baseline Year 10

10th Grade

97 Qs

Computer Science Everything

Computer Science Everything

10th - 11th Grade

97 Qs

Computer Science Variables Conditionals Functions

Computer Science Variables Conditionals Functions

9th - 12th Grade

88 Qs

Cybersecurity Midterm

Cybersecurity Midterm

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Joseph Gilliam

Used 36+ times

FREE Resource

93 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?

Configure account lockout in Group Policy.

Configure account policies in Group Policy.

Configure account expiration in the user accounts.

Configure day/time restrictions in the user accounts.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Microsoft tool can be used to review a system's security configuration against recommended settings?

Microsoft Security Compliance Toolkit

Registry Editor

Microsoft Internet Explorer

Windows Defender

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of update should be prioritized even outside of a normal patching window?

Microsoft updates

Security updates

Critical updates

Monthly updates

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following makes this documentation more useful? (select 3)

Have a printed hard copy kept in a secure location.

Identify the choke points on the network.

Automate administration as much as possible.

Identify who is responsible for each device.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)

WSUS

Security Templates

Group Policy

Security Configuration and Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a configuration baseline?

A list of common security settings that a group or all devices share

A collection of security settings that can be automatically applied to a device

A set of performance statistics that identifies normal operating performance

The minimum services required for a server to function

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By definition, what is the process of reducing security exposure and tightening security controls?

Hardening

Passive reconnaissance

Social engineering

Active scanning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?