Domain 4 Network Security

Quiz
•
Information Technology (IT)
•
12th Grade
•
Hard
Wayground Content
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involved the attacker impersonaing both sides of a conversation between 2 hosts?
On-path attack
Deauthentication
DoS
Spoofing
Answer explanation
An on-path attack, also known as a man-in-the-middle, MiTM attack allows the attacker to impersonate both parties involved in a network conversation.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security concept dictates that a user be given only the permission to perform their job?
Zero trust
Role-based access
Least privilege
Defense in depth
Answer explanation
The principle of least privilege dictates that a user be given the least permission to perform their job.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which principle describes the process of verification of a user's identity?
Authentication
Authorization
Accounting
Auditing
Answer explanation
Authentication is the process of verification of a user's identify.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which attack can be used on a native VLAN?
Double-tagging
VLAN traversal
Truck popping
Denial of Service
Answer explanation
Double-tagging in an attack that can be sued against the native VLAN. The attacker will tage the natvie VLAN on a fram and then tag another inside that fram for the VLAN that the attacker intends to compromise.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which console-based management protocol has built-in security?
SSH
SCP
HTTPS
FTP
Answer explanation
Secure Shell (SSH) negotiates encryption when a connection is made.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication system is an open standard originally proposed by the Internet Engineering Task Force (IETF)?
RADIUS
TACACS+
Kerberos
LDAP
Answer explanation
Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and because an open standard for authentication, often used with 802.1X.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which form of social engineering is nothing more than lookin gover someone's shoulder while they enter or view sensitive information?
Shoulder surfing
Phishing
Tailgating
Whaling
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Kuis Single Board Computer (SBC)

Quiz
•
12th Grade
20 questions
Soal Ulangan Internet 8.7

Quiz
•
8th Grade - University
20 questions
Ulangan Internet Kelas 8.9

Quiz
•
8th Grade - University
20 questions
Quiz sur les Concepts de base de l'informatique

Quiz
•
12th Grade
15 questions
Quiz de Interconexión de Redes

Quiz
•
12th Grade
15 questions
Ақпараттық желілер туралы тест

Quiz
•
12th Grade
19 questions
سوالات امنیت فناوری و شبکه

Quiz
•
12th Grade
15 questions
Hardware

Quiz
•
11th Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Video Games

Quiz
•
6th - 12th Grade
28 questions
Ser vs estar

Quiz
•
9th - 12th Grade
13 questions
BizInnovator Startup - Experience and Overview

Quiz
•
9th - 12th Grade
16 questions
AP Biology: Unit 1 Review (CED)

Quiz
•
9th - 12th Grade
20 questions
Parallel lines and transversals

Quiz
•
9th - 12th Grade
9 questions
Geometry and Trigonometry Concepts

Interactive video
•
9th - 12th Grade
10 questions
Angle Relationships with Parallel Lines and a Transversal

Quiz
•
9th - 12th Grade