Search Header Logo

CIW Network Technology Lesson 6

Authored by D Davenport

Computers

12th Grade

Used 8+ times

CIW Network Technology Lesson 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an account lockout?

To provide access to selected external users.

To inspect all packets addressed to a user-level application.

To automatically disable a user account after a certain number of failed authentication attempts.

To save every change made to computer data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does BYOD stand for?

Bring Your Own Device

Backup Your Own Data

Bring Your Own Data

Backup Your Own Device

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a digital certificate used for?

To monitor and control the operation of the computer infected with the server code.

To authenticate a program or a sender's public key, or to initiate SSL sessions.

To provide access to selected external users.

To save every change made to computer data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of IP Security (IPsec)?

To authenticate and encrypt data to provide security over the Internet.

To inspect all packets addressed to a user-level application.

To automatically disable a user account after a certain number of failed authentication attempts.

To save every change made to computer data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a hypervisor in computing?

To run multiple operating systems on a server concurrently.

To authenticate and encrypt data to provide security over the Internet.

To automatically disable a user account after a certain number of failed authentication attempts.

To provide access to selected external users.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Kerberos in the context of computer security?

A virus that targets computer systems.

A password manager software.

A proprietary key-management scheme for secure communication.

A type of malware.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does MDM stand for in the context of BYOD networks?

Mobile Device Management

Malware Detection Module

Mobile Data Monitoring

Manual Data Manipulation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?