Site MapHelpFeedbackSelf-Assessment Quiz
Self-Assessment Quiz
(See related pages)



1

1. Where do most network threats come from?
A)Internal users
B)External users
C)Both internal and external users
D)Network technicians
2

What aspect of protecting your network involves theft of equipment?
A)Packet filtering
B)Physical security
C)Policies
D)Port filtering
3

Which of the following items make up the strongest complex passwords?
A)Lowercase letters
B)Uppercase letters
C)Numbers
D)Special characters
E)All of the above
4

What is another name for port filtering?
A)Port blocking
B)Port filing
C)Port folders
D)Port segments
5

What is the term used to describe when folder permissions flow downward into subfolders?
A)Flowing
B)Inheritance
C)Permissions
D)Propagation
6

How should user accounts be established?
A)Open to all company individuals
B)Only given to specified individuals
C)Allowed access to needed resources
D)Allowed access to all resources
E)Answers B and C
7

Where would a DMZ more commonly be found?
A)On a single PC
B)On a server
C)On a SOHO
D)On a larger network
8

Just after opening a Microsoft Excel spreadsheet, Rowan notices that some of his filenames have changed and that his network connection no longer works. What type of malware has infected his computer?
A)Worm
B)Macro
C)Trojan
D)Rootkit
9

What problem does a rogue access point introduce?
A)Unauthorized physical access to a server
B)Unauthorized access to a wired network
C)Unauthorized access to a wireless network
D)Unauthorized physical access to a router or gateway
10

What is the difference between a virus and a worm?
A)A virus is only distributed via e-mail. A worm is only distributed via infected Web servers.
B)A worm is only distributed via e-mail. A virus is only distributed via infected Web servers.
C)A virus replicates across networks. A worm does not.
D)A worm replicates across networks. A virus does not.
11

Which statements about passwords are true?
A)You should change your password regularly.
B)You should use familiar terms, like your pet’s name or your birthday, as your password because it will be easy for you to remember.
C)Writing your password on a piece of paper in case you forget it is okay as long as you keep the paper in a locked drawer.
D)You may not use spaces in a password.
E)Answers A and C
12

Which statement is true?
A)A DoS uses a zombie whereas a DDoS uses a botnet to attack a single system.
B)A DoS uses a botnet whereas a DDoS uses a zombie to attack a single system.
C)A DoS attacks a single system whereas a DDoS attacks multiple systems.
D)A DoS attacks systems on the Internet whereas a DDoS attacks system in a DMZ.
13

What is a honeypot?
A)It acts as a fake network, luring potential hackers away from the actual network.
B)It is a security measure that slows unauthorized network access to a crawl (as if running in honey), making your network undesirable to hackers.
C)It is what hackers call an easily hacked network.
D)It is a specialized padlock manufactured for the sole purpose of securing computer systems.
14

You receive an e-mail from your credit card company informing you that your card number has been stolen. You click a link in the e-mail and are taken to what looks like your credit card company’s Web site, where you are asked to enter your credit card number to determine if it is among those that were recently stolen. What should you do?
A)Enter your credit card number immediately to determine if it is among those stolen because this is the only way to protect against unauthorized charges to your account.
B)Call the toll-free number listed on the Web site to verify it is legitimate before entering your card number.
C)Call the toll-free number listed on the Web site and read your card number over the phone to the customer service representative.
D)Close your browser without entering your card number because it is likely a phishing scam, and then call the toll-free number listed on the back of your actual credit card to verify that is the case.
15

Which are examples of a software firewall?
A)The firewall software built into a router
B)Host-based firewalls
C)Network-based firewalls
D)ZoneAlarm Pro
E)Answers B and D







Mike Meyers CompTIA Network+Online Learning Center

Home > Chapter 16 > Self-Assessment Quiz