
NET+ Quiz Part 26
Authored by Pat Johnson
Computers
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
80 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT an objective covered in Chapter 9 of the Network+ learning material?
Explain common security concepts.
Compare and contrast common types of attacks.
Discuss the history of computer networks.
Explain the importance of physical security.
Answer explanation
Discuss the history of computer networks is NOT covered in Chapter 9 of the Network+ learning material.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Chapter 9 of the Network+ learning material focus on?
Programming languages
Network security
Database management
Software development
Answer explanation
Chapter 9 of the Network+ learning material focuses on network security.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which CompTIA Network+ objectives are covered in Chapter 9?
1.1, 1.2, 1.3, 1.4
2.1, 2.2, 2.3, 2.4
3.1, 3.2, 3.3, 3.4
4.1, 4.2, 4.3, 4.4, 4.5
Answer explanation
Chapter 9 covers CompTIA Network+ objectives 4.1, 4.2, 4.3, 4.4, and 4.5, as indicated in the correct answers.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is network security considered one of the toughest areas of IT to be responsible for?
It requires knowledge of multiple programming languages.
New threats surface regularly, requiring constant learning.
It involves managing large databases.
It focuses on software development.
Answer explanation
New threats surface regularly, requiring constant learning.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or false: Filtering network traffic using a system’s MAC address typically is done using an ACL.
True
False
Answer explanation
Filtering network traffic using a system’s MAC address is typically done using an ACL, making the statement true.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or false: LDAP is a protocol that provides a mechanism to access and query directory services systems.
True
False
Answer explanation
LDAP is indeed a protocol used to access and query directory services systems, making the statement true.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which access control model uses an access control list (ACL) to determine access?
Role-based access control (RBAC)
Mandatory access control (MAC)
Discretionary access control (DAC)
Attribute-based access control (ABAC)
Answer explanation
Discretionary access control (DAC) uses an access control list (ACL) to determine access, allowing users to control access to their own resources.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?