MTA98-368 Mobility - 3

MTA98-368
Mobility and Device Fundamentals

Hoofdstuk 3
Device Security
1 / 20
next
Slide 1: Slide

This lesson contains 20 slides, with interactive quizzes and text slides.

Items in this lesson

MTA98-368
Mobility and Device Fundamentals

Hoofdstuk 3
Device Security

Slide 1 - Slide

Quiz
Je krijgt meerkeuze en sleepvragen over het hoofdstuk
Na elke vraag bespreken wij het goede en foute antwoord!

Zelf oefenen:
https://www.exam-labs.com/exam/98-368#tutorial

Slide 2 - Slide

A network zone that allows remote access for employees of your company is known as
a(n)
A
Internet
B
Intranet
C
Extranet
D
Network

Slide 3 - Quiz

The ..... is an enormous system of interlinked hypertext documents.
A
Splinternet
B
Intranet
C
Extranet
D
World Wide Web (WWW)

Slide 4 - Quiz

The type of attack that uses an extensive list of potential passwords is known as a(n)
A
Dictionary attack
B
DDoS
C
WordFeud
D
Keylogger

Slide 5 - Quiz

A(n) ….. is a numeric password shared between a user and a system that can be used to authenticate the user to the system.
A
IBAN
B
BSN
C
Login Password
D
Personal identification number (PIN)

Slide 6 - Quiz

A device that can provide you with a second password to log in to a system is a(n) ...
A
Key
B
Security Token
C
Login Password
D
SSL Certificate

Slide 7 - Quiz

.... permissions flow from a parent object to a child object.
A
Default
B
Explicit
C
Local
D
Inherited

Slide 8 - Quiz

.... is software that is designed to infiltrate or infect a computer, usually with ill intent.
A
Malicious software (malware)
B
HackerForm
C
Patient Information System

Slide 9 - Quiz

Your manager asks you to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will serve requests to users connecting to your intranet. Which type of zone does your manager want you to set up?
A
DMZ
B
Extranet
C
FTP
D
VPN

Slide 10 - Quiz

Which of the following are common types of password attacks?
A
Brute force
B
Worm
C
Rootkit
D
VPN

Slide 11 - Quiz

Which of the following is not a method for authentication?
A
Something the user knows
B
Something the user owns or possesses
C
Encryption
D
Something the user is

Slide 12 - Quiz

Which of the following is not a biometric device?
A
Retinal scanners
B
Fingerprint scanners
C
Password readers
D
Face scanners

Slide 13 - Quiz

Which of the following file systems offers the best security?
A
FAT
B
FAT32
C
NTFS
D
EFS

Slide 14 - Quiz

Which type of permission is granted directly to a file or folder?
A
Explicit
B
Inherited
C
Effective
D
Share

Slide 15 - Quiz

Your computer seems to be slow and you notice that you have a different default web page than usual. Which of the following is the most likely the cause of problems?
A
Your ISP has slowed your network connection
B
Your computer has been infected with malware
C
You did not update your computer
D
You did not lock your default home page

Slide 16 - Quiz

Besides installing an antivirus software package, you should always ___________ to protect your computer against malware
A
reboot your computer on a regular basis
B
Allow only one user to use your computer
C
spoof your IP address
D
keep your machine up to date with the latest security patches

Slide 17 - Quiz

Which technique is used to modify the network address information of a host while traffic is traversing a router or firewall?
A
brute force
B
multifactor authentication
C
Network Address Translation
D
Nonrepudiation

Slide 18 - Quiz

Which of the following is the largest public WAN in the world?
A
DMZ
B
Intranet
C
Extranet
D
Internet

Slide 19 - Quiz

MTA98-368
Mobility and Device Fundamentals

Hoofdstuk 3
Device Security

Slide 20 - Slide