Search Header Logo

ITS Network Security D3

Authored by Rainusa Indo

Computers

Professional Development

Used 13+ times

ITS Network Security D3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are an intern for a company. Your manager wants to be sure that you understand the types of social engineering threats that might occur

Which type of threat mitigation educates the staff within an organization, explaining what to do, when, why, and by whom?

Defense in Depth

Policies, Procedures, and Awareness

Physical Security

Acceptable Use Policy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology examines packet header information to determine whether network traffic is allowed to enter the internal network?

Dedicated firewall

RADIUS server

Antivirus software

BitLocker To Go

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does role separation improve server security?

By placing servers on separate VLANs

By physically separating high-security servers from other servers

By enforcing the principle of least privilege.

By installing applications on separate hard disks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For each statement, select True or False

To protect users from malicious browser pop-ups, you should set a default browser configuration that blocks untrusted pop-ups.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For each statement, select True or False

Pop-ups can display a realistic operating system or application error message.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For each statement, select True or False

Protecting users from untrusted pop-up applications is mostly a function of awareness.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has a Windows Bring Your Own Device (BYOD) policy that includes ensuring that all devices are protected against various malware attacks.

Where should you go on the local device to verify and configure the appropriate settings?

Virus & Threat Protection

Account Protection

User Account Control

Device Performance and Health

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?