
Net Sec I Test Review
Authored by La'Keisha Carter
Computers
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following functions are performed by a TPM?
Create a hash of system components
Perform bulk encryption
Encrypt network data using IPsec
Provide authentication credentials
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of control is used to discourage malicious actors from attempting to breach a network?
Preventative
Detective
Deterrent
Physical
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the BEST solution to allow access to private resources from the internet?
VPN
FTP
Packet filters
Subnet
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the MOST common form of authentication?
Password
Digital certificate on a smart card
Photo ID
Fingerprint
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is responsible for broadcasting information and data over radio waves?
Wireless access point
Wireless bridge
Wireless interface
Wireless LAN controller
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for a phishing attack conducted through a voice channel, such as a phone call?
Vishing
SMiShing
Phishing
Pharming
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is commonly used in the first phase of Internet Key Exchange (IKE) negotiations for authenticating the identity of peers?
Security questions
Digital certificates
Passwords
Biometrics
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?