ITS Network Security D3

ITS Network Security D3

Professional Development

•

43 Qs

quiz-placeholder

Similar activities

202508500003

202508500003

Professional Development

•

45 Qs

202508500001

202508500001

Professional Development

•

40 Qs

Cyber Security

Cyber Security

Professional Development

•

40 Qs

Davinci Resolve 17 Fusion 101

Davinci Resolve 17 Fusion 101

11th Grade - Professional Development

•

45 Qs

La Capa Física y los Sistemas de Cableado Estructurado

La Capa Física y los Sistemas de Cableado Estructurado

Professional Development

•

40 Qs

AZ-900 Practice Test 1

AZ-900 Practice Test 1

Professional Development

•

43 Qs

KJD 10 Siniu

KJD 10 Siniu

Professional Development

•

40 Qs

Introduction to Statistics

Introduction to Statistics

Professional Development

•

41 Qs

ITS Network Security D3

ITS Network Security D3

Assessment

Quiz

•

Computers

•

Professional Development

•

Practice Problem

•

Easy

Created by

Rainusa Indo

Used 13+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are an intern for a company. Your manager wants to be sure that you understand the types of social engineering threats that might occur

Which type of threat mitigation educates the staff within an organization, explaining what to do, when, why, and by whom?

Defense in Depth

Policies, Procedures, and Awareness

Physical Security

Acceptable Use Policy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology examines packet header information to determine whether network traffic is allowed to enter the internal network?

Dedicated firewall

RADIUS server

Antivirus software

BitLocker To Go

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does role separation improve server security?

By placing servers on separate VLANs

By physically separating high-security servers from other servers

By enforcing the principle of least privilege.

By installing applications on separate hard disks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For each statement, select True or False

To protect users from malicious browser pop-ups, you should set a default browser configuration that blocks untrusted pop-ups.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For each statement, select True or False

Pop-ups can display a realistic operating system or application error message.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For each statement, select True or False

Protecting users from untrusted pop-up applications is mostly a function of awareness.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization has a Windows Bring Your Own Device (BYOD) policy that includes ensuring that all devices are protected against various malware attacks.

Where should you go on the local device to verify and configure the appropriate settings?

Virus & Threat Protection

Account Protection

User Account Control

Device Performance and Health

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?