MTA98-368 Mobility - 3

MTA98-368
Mobility and Device Fundamentals

Hoofdstuk 3
Device Security
1 / 20
volgende
Slide 1: Tekstslide

In deze les zitten 20 slides, met interactieve quizzen en tekstslides.

Onderdelen in deze les

MTA98-368
Mobility and Device Fundamentals

Hoofdstuk 3
Device Security

Slide 1 - Tekstslide

Quiz
Je krijgt meerkeuze en sleepvragen over het hoofdstuk
Na elke vraag bespreken wij het goede en foute antwoord!

Zelf oefenen:
https://www.exam-labs.com/exam/98-368#tutorial

Slide 2 - Tekstslide

A network zone that allows remote access for employees of your company is known as
a(n)
A
Internet
B
Intranet
C
Extranet
D
Network

Slide 3 - Quizvraag

The ..... is an enormous system of interlinked hypertext documents.
A
Splinternet
B
Intranet
C
Extranet
D
World Wide Web (WWW)

Slide 4 - Quizvraag

The type of attack that uses an extensive list of potential passwords is known as a(n)
A
Dictionary attack
B
DDoS
C
WordFeud
D
Keylogger

Slide 5 - Quizvraag

A(n) ….. is a numeric password shared between a user and a system that can be used to authenticate the user to the system.
A
IBAN
B
BSN
C
Login Password
D
Personal identification number (PIN)

Slide 6 - Quizvraag

A device that can provide you with a second password to log in to a system is a(n) ...
A
Key
B
Security Token
C
Login Password
D
SSL Certificate

Slide 7 - Quizvraag

.... permissions flow from a parent object to a child object.
A
Default
B
Explicit
C
Local
D
Inherited

Slide 8 - Quizvraag

.... is software that is designed to infiltrate or infect a computer, usually with ill intent.
A
Malicious software (malware)
B
HackerForm
C
Patient Information System

Slide 9 - Quizvraag

Your manager asks you to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will serve requests to users connecting to your intranet. Which type of zone does your manager want you to set up?
A
DMZ
B
Extranet
C
FTP
D
VPN

Slide 10 - Quizvraag

Which of the following are common types of password attacks?
A
Brute force
B
Worm
C
Rootkit
D
VPN

Slide 11 - Quizvraag

Which of the following is not a method for authentication?
A
Something the user knows
B
Something the user owns or possesses
C
Encryption
D
Something the user is

Slide 12 - Quizvraag

Which of the following is not a biometric device?
A
Retinal scanners
B
Fingerprint scanners
C
Password readers
D
Face scanners

Slide 13 - Quizvraag

Which of the following file systems offers the best security?
A
FAT
B
FAT32
C
NTFS
D
EFS

Slide 14 - Quizvraag

Which type of permission is granted directly to a file or folder?
A
Explicit
B
Inherited
C
Effective
D
Share

Slide 15 - Quizvraag

Your computer seems to be slow and you notice that you have a different default web page than usual. Which of the following is the most likely the cause of problems?
A
Your ISP has slowed your network connection
B
Your computer has been infected with malware
C
You did not update your computer
D
You did not lock your default home page

Slide 16 - Quizvraag

Besides installing an antivirus software package, you should always ___________ to protect your computer against malware
A
reboot your computer on a regular basis
B
Allow only one user to use your computer
C
spoof your IP address
D
keep your machine up to date with the latest security patches

Slide 17 - Quizvraag

Which technique is used to modify the network address information of a host while traffic is traversing a router or firewall?
A
brute force
B
multifactor authentication
C
Network Address Translation
D
Nonrepudiation

Slide 18 - Quizvraag

Which of the following is the largest public WAN in the world?
A
DMZ
B
Intranet
C
Extranet
D
Internet

Slide 19 - Quizvraag

MTA98-368
Mobility and Device Fundamentals

Hoofdstuk 3
Device Security

Slide 20 - Tekstslide