CCNA1 Network Security Quiz

CCNA1 Network Security Quiz

12th Grade

70 Qs

quiz-placeholder

Similar activities

CS Study Guide ALL

CS Study Guide ALL

12th Grade - University

74 Qs

Digital Technology UNIT 1 GCSE Revision (private) UNSURE

Digital Technology UNIT 1 GCSE Revision (private) UNSURE

9th - 12th Grade

66 Qs

Routing & Switching

Routing & Switching

12th Grade

75 Qs

COMPUTER SCIENCE -UNIT 2

COMPUTER SCIENCE -UNIT 2

12th Grade

71 Qs

Final Exam Answers Full - ENSA (71-140)

Final Exam Answers Full - ENSA (71-140)

12th Grade

71 Qs

Networking Concepts Quiz

Networking Concepts Quiz

12th Grade - University

74 Qs

Linux - Unit 5 Review

Linux - Unit 5 Review

9th - 12th Grade

72 Qs

IT Fund - M1:U3 FINAL

IT Fund - M1:U3 FINAL

12th Grade

70 Qs

CCNA1 Network Security Quiz

CCNA1 Network Security Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Kreker _

Used 1+ times

FREE Resource

70 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component is designed to protect against unauthorized communications to and from a computer?

security center

port scanner

antimalware

antivirus

firewall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command will block login attempts on Router A for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

Router A(config)#login block-for 10 attempts 2 within 30

Router A(config)#login block-for 30 attempts 2 within 10

Router A(config)#login block-for 2 attempts 30 within 10

Router A(config)#login block-for 30 attempts 10 within 2

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the network security accounting function?

to require users to prove who they are

to determine which resources a user can access

to keep track of the actions of a user

to provide challenge and response questions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack may involve the use of tools such as nslookup and fping?

access attack

reconnaissance attack

denial of service attack

worm attack

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Match each weakness with an example. (Not all options are used.) Place the options in the following order: security policy weakness

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Match the type of information security threat to the scenario. (Not all options are used.)

Evaluate responses using AI:

OFF

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which example of malicious code would be classified as a Trojan horse?

malware that was written to look like a video game

malware that requires manual user intervention to spread between systems

malware that attaches itself to a legitimate program and spreads to other programs when launched

malware that can automatically spread from one system to another by exploiting a vulnerability in the target

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers