Domain 4 Network Security

Domain 4 Network Security

12th Grade

20 Qs

quiz-placeholder

Similar activities

Brainware

Brainware

9th Grade - University

17 Qs

Introduction to the Drone Industry

Introduction to the Drone Industry

10th Grade - University

15 Qs

IST Digital Citizenship Test  1 Review (25/26)

IST Digital Citizenship Test 1 Review (25/26)

9th - 12th Grade

20 Qs

CCDI Competition- First League - Cycle 3 -

CCDI Competition- First League - Cycle 3 -

9th - 12th Grade

15 Qs

Computer Network and Wireless Network

Computer Network and Wireless Network

7th Grade - University

18 Qs

ViewSonic LCD Training

ViewSonic LCD Training

12th Grade - University

15 Qs

TSC Information Security Awareness Campaign 2024

TSC Information Security Awareness Campaign 2024

12th Grade

15 Qs

Interactive Multimedia

Interactive Multimedia

12th Grade - University

15 Qs

Domain 4 Network Security

Domain 4 Network Security

Assessment

Quiz

Information Technology (IT)

12th Grade

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involved the attacker impersonaing both sides of a conversation between 2 hosts?

On-path attack

Deauthentication

DoS

Spoofing

Answer explanation

An on-path attack, also known as a man-in-the-middle, MiTM attack allows the attacker to impersonate both parties involved in a network conversation.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security concept dictates that a user be given only the permission to perform their job?

Zero trust

Role-based access

Least privilege

Defense in depth

Answer explanation

The principle of least privilege dictates that a user be given the least permission to perform their job.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle describes the process of verification of a user's identity?

Authentication

Authorization

Accounting

Auditing

Answer explanation

Authentication is the process of verification of a user's identify.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack can be used on a native VLAN?

Double-tagging

VLAN traversal

Truck popping

Denial of Service

Answer explanation

Double-tagging in an attack that can be sued against the native VLAN. The attacker will tage the natvie VLAN on a fram and then tag another inside that fram for the VLAN that the attacker intends to compromise.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which console-based management protocol has built-in security?

SSH

SCP

HTTPS

FTP

Answer explanation

Secure Shell (SSH) negotiates encryption when a connection is made.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication system is an open standard originally proposed by the Internet Engineering Task Force (IETF)?

RADIUS

TACACS+

Kerberos

LDAP

Answer explanation

Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and because an open standard for authentication, often used with 802.1X.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of social engineering is nothing more than lookin gover someone's shoulder while they enter or view sensitive information?

Shoulder surfing

Phishing

Tailgating

Whaling

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?