Cybersecurity Midterm

Quiz
•
Computers
•
9th - 12th Grade
•
Easy
Joseph Gilliam
Used 36+ times
FREE Resource
93 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?
Configure account lockout in Group Policy.
Configure account policies in Group Policy.
Configure account expiration in the user accounts.
Configure day/time restrictions in the user accounts.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Microsoft tool can be used to review a system's security configuration against recommended settings?
Microsoft Security Compliance Toolkit
Registry Editor
Microsoft Internet Explorer
Windows Defender
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of update should be prioritized even outside of a normal patching window?
Microsoft updates
Security updates
Critical updates
Monthly updates
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following makes this documentation more useful? (select 3)
Have a printed hard copy kept in a secure location.
Identify the choke points on the network.
Automate administration as much as possible.
Identify who is responsible for each device.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)
WSUS
Security Templates
Group Policy
Security Configuration and Analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a configuration baseline?
A list of common security settings that a group or all devices share
A collection of security settings that can be automatically applied to a device
A set of performance statistics that identifies normal operating performance
The minimum services required for a server to function
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By definition, what is the process of reducing security exposure and tightening security controls?
Hardening
Passive reconnaissance
Social engineering
Active scanning
Create a free account and access millions of resources
Similar Resources on Wayground
90 questions
Computing year 11

Quiz
•
11th Grade
97 questions
ICT - Baseline Year 10

Quiz
•
10th Grade
88 questions
Programming Quiz based on Teach ICT - all topics AQA GCSE

Quiz
•
9th Grade
91 questions
Von Neumann Architecture Quiz

Quiz
•
9th Grade
92 questions
Networking Quiz

Quiz
•
12th Grade
97 questions
Yr 12 CS - Data Transmission

Quiz
•
11th Grade
89 questions
Quiz: Module 4

Quiz
•
9th Grade
95 questions
TGAU Tech Digidol 1.6 - Technoleg Newidiol

Quiz
•
9th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)

Quiz
•
9th Grade
15 questions
MLA Formatting

Quiz
•
9th Grade
20 questions
Typing Practice

Quiz
•
7th - 12th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
20 questions
Google Sheets Quiz

Quiz
•
9th Grade