367-668e9599c27f09d7ba49cf01

367-668e9599c27f09d7ba49cf01

Professional Development

37 Qs

quiz-placeholder

Similar activities

Airline First Aid

Airline First Aid

10th Grade - Professional Development

38 Qs

Module4_E-COMMERCE1

Module4_E-COMMERCE1

Professional Development

40 Qs

Quizizz SOX UD7-UD8-UD9-UD10-UD11

Quizizz SOX UD7-UD8-UD9-UD10-UD11

Professional Development

40 Qs

Roblox piggy

Roblox piggy

KG - Professional Development

33 Qs

Malhub Cybersecurity Quiz 1

Malhub Cybersecurity Quiz 1

Professional Development

35 Qs

TrainingQIZZ(HCM22_FR_NET_01)

TrainingQIZZ(HCM22_FR_NET_01)

University - Professional Development

32 Qs

Minecraft Q&A

Minecraft Q&A

1st Grade - Professional Development

35 Qs

piggy

piggy

KG - Professional Development

35 Qs

367-668e9599c27f09d7ba49cf01

367-668e9599c27f09d7ba49cf01

Assessment

Quiz

Other

Professional Development

Easy

Created by

Abang Gembot

Used 3+ times

FREE Resource

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which characteristic of the attack indicates that it is not being eradicated by antimalware programs?

Stealth

Rootkit

Zero-day

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which best describes the reason for encrypting offline files?

To protect files in case of a device is lost or stolen

To control permissions on files

To be able to use TPM on files

To control shares on files

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the layers of defense in the anti-phishing and malware protection strategies developed by Microsoft is _______.

SmartScreen Filter

Malware Detector

SureBlock

Home Defense

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tunneling protocol is used to carry packets from unroutable IP addresses across a routable IP network?

GRE

PPTP

PPP

IPsec

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rule sets on firewalls is part of evaluating the _______ attack surfaces.

Spoofing

Application

Employee

Network

Server

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use the dropdown menus to complete each statement regarding types of attack surfaces.

The number of running services falls under the _______ attack surface.

Spoofing

Application

Employee

Network

Server

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A junior administrator asks you what it means to harden a server. Which two statements fit the description of hardening a server?

Install new features

Disable unnecessary services

Minimize crosstalk

Place the server in a secure location

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?