Domain 4 Network Security

Domain 4 Network Security

12th Grade

20 Qs

quiz-placeholder

Similar activities

سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

12th Grade

19 Qs

OJM 3 - 2024

OJM 3 - 2024

12th Grade

25 Qs

ASAS GANJIL MATERI FIBER OPTIC

ASAS GANJIL MATERI FIBER OPTIC

12th Grade

20 Qs

Exploring Digital Transformation and IoT

Exploring Digital Transformation and IoT

12th Grade

15 Qs

Lesson 1: Online Services

Lesson 1: Online Services

9th - 12th Grade

15 Qs

Final Assessment UMTS

Final Assessment UMTS

12th Grade

20 Qs

Quiz Topologi Jaringan Komputer

Quiz Topologi Jaringan Komputer

12th Grade

18 Qs

Hardware

Hardware

11th Grade - University

15 Qs

Domain 4 Network Security

Domain 4 Network Security

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Quizizz Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involved the attacker impersonaing both sides of a conversation between 2 hosts?

On-path attack

Deauthentication

DoS

Spoofing

Answer explanation

An on-path attack, also known as a man-in-the-middle, MiTM attack allows the attacker to impersonate both parties involved in a network conversation.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security concept dictates that a user be given only the permission to perform their job?

Zero trust

Role-based access

Least privilege

Defense in depth

Answer explanation

The principle of least privilege dictates that a user be given the least permission to perform their job.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle describes the process of verification of a user's identity?

Authentication

Authorization

Accounting

Auditing

Answer explanation

Authentication is the process of verification of a user's identify.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which attack can be used on a native VLAN?

Double-tagging

VLAN traversal

Truck popping

Denial of Service

Answer explanation

Double-tagging in an attack that can be sued against the native VLAN. The attacker will tage the natvie VLAN on a fram and then tag another inside that fram for the VLAN that the attacker intends to compromise.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which console-based management protocol has built-in security?

SSH

SCP

HTTPS

FTP

Answer explanation

Secure Shell (SSH) negotiates encryption when a connection is made.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication system is an open standard originally proposed by the Internet Engineering Task Force (IETF)?

RADIUS

TACACS+

Kerberos

LDAP

Answer explanation

Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and because an open standard for authentication, often used with 802.1X.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of social engineering is nothing more than lookin gover someone's shoulder while they enter or view sensitive information?

Shoulder surfing

Phishing

Tailgating

Whaling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?