You are on page 1of 4

1/26/24, 9:37 PM Network Security - PreQuiz: Attempt review


 Dashboard / Primer 2.0 - Infrastructure Security / Stage 1 / Infrastructure & Security Overview & Network Fundamentals / Network Security

Quiz review
Started on Friday, 26 January 2024, 9:27 PM
State Finished
Completed on Friday, 26 January 2024, 9:37 PM
Time taken 10 mins 7 secs
Marks 7.00/10.00
Grade 70.00 out of 100.00

Question 1
Incorrect

Mark 0.00 out of 1.00

What is the most crucial activity in the system?

Cracking passwords
Escalating Privileges
46684
Gathering 
Covering Tracks

The correct answer is: Cracking passwords

Question 2
Correct

Mark 1.00 out of 1.00

46684
Firewalls are to protect against

Data Driven Attacks


Unauthorized attacks
Virus Attacks
Fire Attacks

The correct answer is: Unauthorized attacks

Question 3
46684
Correct

Mark 1.00 out of 1.00

A system's security can be improved by

Audit logs
Threat monitoring
View logs
Verification

The correct answer is: Audit logs


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1089915&cmid=6065 1/4
1/26/24, 9:37 PM Network Security - PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

Which of the following should we do our best to configure your systems and networks?

Detection
Reaction
Protection
Action

The correct answer is: Protection

Question 5
Incorrect

Mark 0.00 out of 1.00

46684
A is a way for computers to interact with one another.

Port
Gateways
Protocols 
Socket

The correct answer is: Port

Question 6
Correct
46684
Mark 1.00 out of 1.00

Today, is commonly used to secure data in transit in a number of applications, like Internet data transfer.

Internet Security
Data mining
Architectural Security
encryption

The correct answer is: encryption


46684


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1089915&cmid=6065 2/4
1/26/24, 9:37 PM Network Security - PreQuiz: Attempt review

Question 7
Correct

Mark 1.00 out of 1.00

Security features that limit who has access to the OS's resources.

Validation
Identification
Access Control
Authentication

The correct answer is: Access Control

Question 8
Correct

Mark 1.00 out of 1.00

46684
One of the following procedures is used to verify a user's identity?

Identification
authentication
Verification
Validation

The correct answer is: authentication

Question 9
Incorrect
46684
Mark 0.00 out of 1.00

Which is the threats for clients?

Trojan Horses 
Worms
virus
Tests

The correct answer is: virus


46684


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1089915&cmid=6065 3/4
1/26/24, 9:37 PM Network Security - PreQuiz: Attempt review

Question 10
Correct

Mark 1.00 out of 1.00

The integrity and confidentiality of data passing over a network are ensured by?

Firewall
Antivirus
Penetration Testing
network-security proctocols

The correct answer is: network-security proctocols

◄ Addressing & Network Protocols - PostQuiz

Jump to...
46684 NW Security Overview ►

46684

46684


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1089915&cmid=6065 4/4

You might also like