This lesson contains 20 slides, with interactive quizzes and text slides.
Items in this lesson
MTA98-368
Mobility and Device Fundamentals
Hoofdstuk 3
Device Security
Slide 1 - Slide
Quiz
Je krijgt meerkeuze en sleepvragen over het hoofdstuk
Na elke vraag bespreken wij het goede en foute antwoord!
Zelf oefenen:
https://www.exam-labs.com/exam/98-368#tutorial
Slide 2 - Slide
A network zone that allows remote access for employees of your company is known as a(n)
A
Internet
B
Intranet
C
Extranet
D
Network
Slide 3 - Quiz
The ..... is an enormous system of interlinked hypertext documents.
A
Splinternet
B
Intranet
C
Extranet
D
World Wide Web (WWW)
Slide 4 - Quiz
The type of attack that uses an extensive list of potential passwords is known as a(n)
A
Dictionary attack
B
DDoS
C
WordFeud
D
Keylogger
Slide 5 - Quiz
A(n) ….. is a numeric password shared between a user and a system that can be used to authenticate the user to the system.
A
IBAN
B
BSN
C
Login Password
D
Personal identification number (PIN)
Slide 6 - Quiz
A device that can provide you with a second password to log in to a system is a(n) ...
A
Key
B
Security Token
C
Login Password
D
SSL Certificate
Slide 7 - Quiz
.... permissions flow from a parent object to a child object.
A
Default
B
Explicit
C
Local
D
Inherited
Slide 8 - Quiz
.... is software that is designed to infiltrate or infect a computer, usually with ill intent.
A
Malicious software (malware)
B
HackerForm
C
Patient Information System
Slide 9 - Quiz
Your manager asks you to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will serve requests to users connecting to your intranet. Which type of zone does your manager want you to set up?
A
DMZ
B
Extranet
C
FTP
D
VPN
Slide 10 - Quiz
Which of the following are common types of password attacks?
A
Brute force
B
Worm
C
Rootkit
D
VPN
Slide 11 - Quiz
Which of the following is not a method for authentication?
A
Something the user knows
B
Something the user owns or possesses
C
Encryption
D
Something the user is
Slide 12 - Quiz
Which of the following is not a biometric device?
A
Retinal scanners
B
Fingerprint scanners
C
Password readers
D
Face scanners
Slide 13 - Quiz
Which of the following file systems offers the best security?
A
FAT
B
FAT32
C
NTFS
D
EFS
Slide 14 - Quiz
Which type of permission is granted directly to a file or folder?
A
Explicit
B
Inherited
C
Effective
D
Share
Slide 15 - Quiz
Your computer seems to be slow and you notice that you have a different default web page than usual. Which of the following is the most likely the cause of problems?
A
Your ISP has slowed your network connection
B
Your computer has been infected with malware
C
You did not update your computer
D
You did not lock your default home page
Slide 16 - Quiz
Besides installing an antivirus software package, you should always ___________ to protect your computer against malware
A
reboot your computer on a regular basis
B
Allow only one user to use your computer
C
spoof your IP address
D
keep your machine up to date with the latest security patches
Slide 17 - Quiz
Which technique is used to modify the network address information of a host while traffic is traversing a router or firewall?
A
brute force
B
multifactor authentication
C
Network Address Translation
D
Nonrepudiation
Slide 18 - Quiz
Which of the following is the largest public WAN in the world?