8 2c

8 2c

12th Grade

57 Qs

quiz-placeholder

Similar activities

CSEC IT- Past Paper MCQ- 2020

CSEC IT- Past Paper MCQ- 2020

12th Grade

60 Qs

CompTIA Sec+ Ultimate Tricky Questions Compendium Part 1

CompTIA Sec+ Ultimate Tricky Questions Compendium Part 1

12th Grade

55 Qs

Intro To Networking 123

Intro To Networking 123

9th - 12th Grade

53 Qs

OCR A Level Computer Science - 1.2.x

OCR A Level Computer Science - 1.2.x

12th Grade

52 Qs

M1:U1 - Final Test - IT Fund+

M1:U1 - Final Test - IT Fund+

9th - 12th Grade

61 Qs

Topic 3.1 Areas of Computer Ethics

Topic 3.1 Areas of Computer Ethics

12th Grade

53 Qs

Computer Programming

Computer Programming

8th - 12th Grade

60 Qs

8 2c

8 2c

Assessment

Quiz

Computers

12th Grade

Easy

Created by

De'Andre Sellers

Used 2+ times

FREE Resource

57 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of network vulnerability mitigation?

To enhance network speed

To increase data storage capacity

To protect against threats and unauthorized access

To reduce the cost of network maintenance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common network threat mentioned in the text?

System crashes

Unauthorized access

Data manipulation

Internal controls

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the text, what does NIST define as fault tolerance?

The ability of a system to operate without electricity

The ability of a system to prevent all cyber attacks

The property of a system that allows proper operation even if components fail

The process of updating system software regularly

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended solution for achieving fault tolerance in a network?

Using a single power supply

Limiting access to the network

Implementing Redundant Arrays of Independent Disks (RAIDs)

Decreasing the number of servers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary benefit of implementing the Principle of Least Privilege (PoLP) in assigning rights and permissions?

To give everyone equal access

To minimize security risks by limiting access

To increase system efficiency by allowing more access

To simplify the management of network systems

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of an Access Control List (ACL) in a system?

It defines the physical components of a system

It lists the users who can access the system hardware

It specifies what users can and cannot do within a system

It monitors and logs user activity on a system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the text, why is it important to have data backups?

To prevent system crashes

To restore lost data in the event of a system failure

To increase data processing speed

To comply with user access policies

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?