Net Sec I Test Review

Net Sec I Test Review

12th Grade

50 Qs

quiz-placeholder

Similar activities

Domain 1 - Network Security

Domain 1 - Network Security

9th Grade - University

46 Qs

ICT 100-150

ICT 100-150

1st - 12th Grade

50 Qs

7517 End of Section 09 Fund of Networks

7517 End of Section 09 Fund of Networks

12th Grade

46 Qs

Asas Sains Komputer Tingkatan 3

Asas Sains Komputer Tingkatan 3

9th - 12th Grade

50 Qs

Cloud Architect 50 preg (196-147) v1

Cloud Architect 50 preg (196-147) v1

12th Grade

48 Qs

AHJ: Unit14 Communication

AHJ: Unit14 Communication

12th Grade - University

50 Qs

AP CSP Exam Review

AP CSP Exam Review

9th - 12th Grade

45 Qs

Mfreed Web Design

Mfreed Web Design

5th - 12th Grade

55 Qs

Net Sec I Test Review

Net Sec I Test Review

Assessment

Quiz

Computers

12th Grade

Hard

Created by

La'Keisha Carter

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following functions are performed by a TPM?

Create a hash of system components

Perform bulk encryption

Encrypt network data using IPsec

Provide authentication credentials

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of control is used to discourage malicious actors from attempting to breach a network?

Preventative

Detective

Deterrent

Physical

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the BEST solution to allow access to private resources from the internet?

VPN

FTP

Packet filters

Subnet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the MOST common form of authentication?

Password

Digital certificate on a smart card

Photo ID

Fingerprint

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is responsible for broadcasting information and data over radio waves?

Wireless access point

Wireless bridge

Wireless interface

Wireless LAN controller

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a phishing attack conducted through a voice channel, such as a phone call?

Vishing

SMiShing

Phishing

Pharming

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is commonly used in the first phase of Internet Key Exchange (IKE) negotiations for authenticating the identity of peers?

Security questions

Digital certificates

Passwords

Biometrics

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers