Internet, Intranet And Extranet! Network Security Trivia Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Reem2009_1981
R
Reem2009_1981
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,776
| Attempts: 1,776 | Questions: 44
Please wait...
Question 1 / 44
0 %
0/100
Score 0/100
1. True Or False You are trying to access a  file in a folder on a windows 8.1 pro computer from a second computer over the network. You have the following permissions : NTFS: full control Share: read-only

Explanation

Since the NTFS permissions are set to full control, it means that you have the ability to read, write, modify, and delete the file. However, the share permissions are set to read-only, which means that other users accessing the file over the network can only read the file but cannot make any changes to it. Therefore, you will be able to read the file but not delete or change it.

Submit
Please wait...
About This Quiz
Internet, Intranet And Extranet! Network Security Trivia Quiz - Quiz

Over the past week, we have covered a lot about the internet, intranet, and extranet all under the network security topic and the quiz below are prepared to... see moresee just how much we got to understand. In the world today, where everything is computerized, there is a high need to ensure just how much knowledge you have to offer. Give it a try! see less

2. Which type of information about users does biometrics evaluate?

Explanation

Biometrics evaluates the physical characteristics of a user. This refers to unique and measurable traits such as fingerprints, facial features, iris patterns, and voiceprints. By analyzing these physical characteristics, biometric systems can accurately identify and authenticate individuals.

Submit
3. Microsoft Azure storage solutions replicate four copies of your data within a single region.

Explanation

The given correct answer is "Three". This means that Microsoft Azure storage solutions replicate three copies of your data within a single region. This ensures data redundancy and increases data durability and availability. By having multiple copies of the data, the chances of data loss or unavailability are minimized, providing a more reliable storage solution for users.

Submit
4. Which is a feature of Active Directory Rights Management  Services  ( AD RMS )?

Explanation

AD RMS allows users to define who can open, modify, print, or forward a document. This feature provides a comprehensive permissions system that allows users to control access to sensitive information and protect it from unauthorized use. Users can set specific permissions for each document, ensuring that only authorized individuals can perform certain actions on it. This enhances security and helps organizations maintain control over their data.

Submit
5. Your company is deploying a new application on employees' personal Windows RT devices. The devices are registered with Microsoft Intune You need to publish the new application to Microsoft Intune cloud storage so that the employees can install the published application. What are the requirements of the published installation files?

Explanation

The requirements for the published installation files are that multiple files can be uploaded, but each individual file cannot exceed 2 GB in size. This means that the application can be broken down into smaller files for easier distribution. The cumulative total file size for all the published applications must also be smaller than 2 GB. Additionally, the files must be in a zip format in order to be uploaded to Microsoft Intune cloud storage.

Submit
6. Which Microsoft Intune Company Portal APP platform requires IT deployment?

Explanation

The Microsoft Intune Company Portal app platform that requires IT deployment is Windows Phone 8.1. This means that in order to deploy and manage the Microsoft Intune Company Portal app on Windows Phone 8.1 devices, IT personnel need to be involved. The other options, such as iOS, Windows RT, and Android, do not require IT deployment as they can be easily downloaded and installed by users from their respective app stores.

Submit
7. You have implemented Virtual Desktop Infrastructure ( VDI ) for employees in your company who use bring your own device ( BYOD). Some employees report high network  latency when loading VDI apps You need to resolve the network latency issue while still maintaining a secure BYOD environment. Which tool should you use?

Explanation

not-available-via-ai

Submit
8. You are an IT intern. You are incorporating multi-factor authentication as part of security protocols .you are using a smart card to authentication What else must be used to make this multi-factor authentication

Explanation

In order to make the smart card authentication a multi-factor authentication, a password must be used in addition to the smart card. This is because multi-factor authentication requires the use of at least two different factors to verify the user's identity. The smart card serves as one factor, while the password serves as another factor. By requiring both the smart card and the password, it adds an extra layer of security to the authentication process.

Submit
9. What is an example of the way in which a Trajan horse commonly spreads to other computers?

Explanation

An example of the way in which a Trojan horse commonly spreads to other computers is by downloading from an infected web page. This means that when a user visits a compromised website, the Trojan horse is automatically downloaded onto their computer without their knowledge or consent. Once the Trojan horse is downloaded, it can then carry out malicious activities, such as stealing sensitive information or damaging the system. It is important for users to be cautious when browsing the internet and to have up-to-date security measures in place to prevent such downloads.

Submit
10. The network has 12 desktop computers and two servers that host a web-based inventory application that all the employee connected to the same network switch A firewall protects all computers and servers from external networks. Which type of network are you configuring?

Explanation

The given scenario describes a network that consists of 12 desktop computers and two servers, all connected to the same network switch. A firewall is in place to protect the network from external networks. This setup suggests that the network is an intranet. An intranet is a private network that is only accessible to authorized users within an organization. It allows for internal communication, collaboration, and sharing of resources.

Submit
11. To strengthen security, you want to utilize multi-factor authentication that uses biometrics. A password and a per-shared security question accomplish this goal.

Explanation

Utilizing a thumbprint for multi-factor authentication strengthens security by adding an additional layer of biometric verification. This means that in addition to a password and a pre-shared security question, the user's thumbprint will also be required to access the system or account. Thumbprints are unique to each individual and are difficult to replicate, making them a reliable form of authentication.

Submit
12. When you copy a file from one NTFS file system partition to a different NTFS partition, what happens to the file permissions of the copied file?

Explanation

When a file is copied from one NTFS file system partition to another, the file permissions of the copied file will inherit the permissions of the destination folder. This means that the copied file will have the same permissions as the folder it is being copied into. This ensures consistency and allows the file to be accessed and managed according to the permissions set for the destination folder.

Submit
13. To share media files between your computer and your video game system, you should create a public network.

Explanation

To share media files between your computer and your video game system, you should create a private network. This is because a private network provides a secure and controlled environment for sharing files between devices. It ensures that only authorized devices can access the network and prevents unauthorized access from external sources. Creating a private network also helps in maintaining the privacy and security of the shared media files.

Submit
14. Your company needs a service that eliminates a single point of failure on any provisioned service. Which feature can Microsoft Azure offer to lower the probability of a failure that disrupts business operations?

Explanation

High availability is the correct answer because it refers to the ability of a system or service to remain operational and accessible even in the event of component failures. By implementing high availability in Microsoft Azure, the company can ensure that there is no single point of failure, reducing the probability of a failure that disrupts business operations. This feature provides redundancy and fault tolerance, allowing the system to automatically switch to a backup or redundant system if one component fails, thus maintaining continuous operation.

Submit
15. What are two ways to lower the risk of a virus or malware infection? Choose two

Explanation

Enabling the Windows firewall helps to protect the computer from unauthorized access and blocks potential threats from entering the system. Keeping the system updated ensures that the latest security patches and fixes are installed, which helps to close any vulnerabilities that could be exploited by viruses or malware. By combining these two measures, the risk of a virus or malware infection can be significantly lowered.

Submit
16. Which term describes the security boundary for an organization that uses Active Directory and defines the scope of authority for administrators?

Explanation

The correct answer is "Forest." In an organization that uses Active Directory, a forest is a security boundary that defines the scope of authority for administrators. A forest is a collection of one or more domains that share a common schema, configuration, and global catalog. It provides a boundary for security and administrative purposes, allowing administrators to manage resources and control access within their designated forest.

Submit
17. The president of your university asks you to set up a service website for students who line in the dorm . The website's official launch date is in two days, and you do not have the resources needed to set up the server infrastructure and develop the system. You need a cloud-based solution that can have the servers and storage available in two days. Which Microsoft cloud solution achieves this goal?

Explanation

Microsoft Azure is the correct answer because it is a cloud-based solution that provides the necessary server infrastructure and storage. It allows for quick deployment and scalability, making it suitable for setting up a service website within a short timeframe.

Submit
18. Computer worms are different from another type of malware or spyware because they are designed to be destructive

Explanation

Computer worms are different from other types of malware or spyware because they can self-replicate. Unlike malware or spyware that may only infect a single system or target specific files, worms have the ability to spread and create copies of themselves across multiple systems. This self-replication feature allows worms to rapidly propagate and infect a large number of devices, causing widespread damage and disruption.

Submit
19. Widows Server Active Directory enables single sin-on , which simplifies user access to thousands of cloud applications on windows , Mac and iOS devices.

Explanation

Azure Active Directory is the correct answer because it is a cloud-based identity and access management service that allows users to sign in and access various cloud applications on different devices. It provides single sign-on capabilities, simplifying user access to cloud applications on Windows, Mac, and iOS devices. Azure Active Directory is specifically designed for cloud-based applications and integrates well with other Microsoft services and products.

Submit
20. Microsoft Azure Remote App provides the ability to centrally manage on-premise systems and corporate result

Explanation

The given correct answer is "System Center 2012 R2 Configuration Manager". This is because the question is asking for a tool or solution that can centrally manage on-premise systems and corporate results. System Center 2012 R2 Configuration Manager is a comprehensive management solution that allows organizations to manage their on-premise systems, including servers, desktops, and mobile devices, from a central location. It provides features such as software distribution, patch management, inventory tracking, and remote control, making it an ideal choice for centrally managing on-premise systems and corporate results.

Submit
21. Match each network to the class of users that can access it.
Submit
22. True Or False Check the right answers

Explanation

You can create a Microsoft Azure virtual machine by using a platform image, which is a pre-configured image provided by Azure. This image contains the operating system and other software that is already installed and configured. By using a platform image, you can quickly create a virtual machine without having to manually install and configure the software.

Submit
23. In order to install Microsoft  Intune client software on a computer, you need to be a member of that computer's Administrators group.

Explanation

The correct answer is "No change is needed" because the statement in the question already states that in order to install Microsoft Intune client software on a computer, you need to be a member of that computer's Administrators group. Therefore, no change or additional group membership is required.

Submit
24. The windows store allows users of Windows 8 and Windows 8.1 computers to view and install applications that the users' administrators make available to them. The computers must be attached to the domain, and the user must be logged in With domain credentials.

Explanation

The given correct answer is "The system Center configuration manager company portal App". This is because the question is asking for an application that allows users to view and install applications made available by their administrators on Windows 8 and Windows 8.1 computers attached to the domain. The System Center Configuration Manager Company Portal App is specifically designed for this purpose, allowing users to access and install applications provided by their administrators while logged in with domain credentials.

Submit
25. What are two strategies to lower the risk of a virus infection that is sent through an email? Choose two

Explanation

Two strategies to lower the risk of a virus infection sent through an email are turning the Windows firewall on and opening attachments only from trusted sources. By enabling the Windows firewall, it can help block unauthorized access and potentially harmful content. Opening attachments only from trusted sources reduces the likelihood of downloading infected files or executing malicious scripts. These measures can help protect against virus infections and enhance the overall security of email communications.

Submit
26. Your university's IT department currently has no Active Directory  strategy . The university needs a solution that allows you to manage users and groups to secure access to Microsoft online services such as Microsoft Office 365. Which Active Dirctory strategy should the university use?

Explanation

The university should use Azure Active Directory as the Active Directory strategy. Azure Active Directory is a cloud-based identity and access management service that allows the university to manage users and groups, as well as secure access to Microsoft online services such as Office 365. It provides a centralized platform for user authentication, single sign-on, and multi-factor authentication, making it an ideal solution for managing access to Microsoft online services in a university setting.

Submit
27. You are responsible for managing employee mobile devices at your company . Your company does not want its medical records distributed to these devices. You need to keep all medical records on corporate resources while still allowing end-users to use their mobile devices for work. Which solution should you deploy?

Explanation

Workplace Join allows users to join their devices to the organization network withoutjoining the device to the Active Directory domain

Submit
28. You need to change the permissions of a file. However, the file was created by a user on a system to which you don't know What are two possible ways to achieve this goal? Choose two

Explanation

Two possible ways to achieve the goal of changing the permissions of a file are: asking the administrator for modify permission to the file and having the user grant you the take ownership permission for the file.

Submit
29. You want to use Microsoft Azure Backup . Which two certificate requirements are necessary to set up your vault ? Choose two

Explanation

To set up a vault for Microsoft Azure Backup, two certificate requirements are necessary. First, a certificate from a CA (Certificate Authority) that is trusted by Microsoft is needed. This ensures that the certificate is issued by a trusted authority and can be used for secure communication. Second, a self-signed certificate is required. This type of certificate is generated and signed by the user or organization themselves, providing a level of security for internal use. Both of these certificates are necessary to establish a secure and trusted connection for Azure Backup.

Submit
30. Match the following
Submit
31. The  OneDrive feature of Microsoft Azure centralizes applications on the same trusted and reliable platform that governments, financial services companies, and other large Organizations use for sensitive information.

Explanation

The OneDrive feature of Microsoft Azure is the correct answer because it centralizes applications on a trusted and reliable platform that is used by governments, financial services companies, and other large organizations for sensitive information. This suggests that RemoteApp, which allows users to access applications from anywhere, would be the most appropriate choice in this context.

Submit
32. A network that is part of your intranet but is extended to users outside of your organization and is accessible from the Internet is a private network.

Explanation

The given correct answer is "An extranet". An extranet is a network that is part of an organization's intranet but is extended to external users, such as partners, suppliers, or customers, who are granted access to certain resources or services. It is accessible from the Internet but still maintains a level of security and restricted access, making it a private network.

Submit
33. What are two types of system-level updates that can be installed automatically on Microsoft surface pro 3? Choose two

Explanation

Surface Pro 3 is a Microsoft product, and it runs on the Windows operating system. Therefore, it is reasonable to assume that system-level updates for the Surface Pro 3 would include Windows software updates. Additionally, firmware updates are specific to the hardware of the device and are necessary for improving performance, fixing bugs, and adding new features. Hence, surface firmware updates are also a type of system-level update that can be installed automatically on the Microsoft Surface Pro 3.

Submit
34. When you access a file located on a shared resource,  the most restrictive permissions take precedence.

Explanation

When accessing a file located on a shared resource, the most restrictive permissions take precedence. This means that if there are different permissions set at different levels (such as at the share level or the file system level), the most restrictive permissions will be applied and enforced. Therefore, no change is needed in this scenario as the statement accurately reflects the behavior of accessing files on shared resources.

Submit
35. Organizational Units help you apply data governance for bring your own device ( BYOD ) because it allows you to identify data by using the classification of files.

Explanation

Dynamic Access Control (DAC), originally called claims-based access control, is used for access management. It provides an automatic mechanism to secure and control access to resources.In Windows Server 2012 R2/2016, DAC allows you to Identify data by usingautomatic and manual classification or tagging files in an organization.

Submit
36. Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune. You need to enforce the following security requirements on personal devices : Company data can be removed if an employee is terminated. Company data cannot be accessed if the device is lost or stolen. What should you do?

Explanation

Enabling selective wipe allows the company to remove company data from personal devices if an employee is terminated, ensuring that sensitive information is not accessible to unauthorized individuals. Enforcing encryption ensures that company data cannot be accessed if the device is lost or stolen, as the data will be encrypted and unreadable without the proper encryption key. This combination of selective wipe and encryption provides a strong security measure for protecting company data on personal devices.

Submit
37. Which feature of an Azure Application detects failed elements and maneuvers around them, and then returns the correct results within a specific time frame?

Explanation

Fault tolerance is the feature of an Azure Application that detects failed elements and maneuvers around them, ensuring that the application continues to function without interruption. It is designed to handle failures and errors by implementing measures such as redundancy, backup systems, and automatic failover. This allows the application to return correct results within a specific time frame, even in the presence of failures or errors. Fault tolerance is crucial for ensuring the reliability and availability of an application, especially in scenarios where downtime or data loss can have significant consequences.

Submit
38. Redundant  Microsoft Azure application is able to meet increased demand with consistent results in acceptable time windows

Explanation

The given correct answer is "Scalable." This means that the redundant Microsoft Azure application can handle increased demand by expanding its resources or capacity, allowing it to consistently deliver results within acceptable time windows. Scalability is crucial for applications that experience varying levels of demand, as it ensures that the system can adapt and handle increased workload without compromising performance or reliability.

Submit
39. True Or False Check the right sentences.

Explanation

The correct answer states that Windows Intune integrates with existing system center 2012 R2 configuration Manager deployments and allows you to manage devices to protect corporate assets using configuration policies and remote wipe. This means that Windows Intune can be seamlessly integrated with the existing system center 2012 R2 configuration Manager deployments and provides features to manage devices and protect corporate assets.

Submit
40. You need to provide a way to allow employees to use their own devices to access company applications that are running in the company data center. Which Microsoft product provides this service?

Explanation

Microsoft Virtual Desktop Infrastructure (VDI) is the correct answer because it allows employees to access company applications running in the company data center using their own devices. VDI provides a virtual desktop environment that can be accessed remotely, allowing employees to use their personal devices while still accessing the necessary company applications securely. This solution enables flexibility and productivity while maintaining the security and control of company data.

Submit
41. Which feature is provided in Azure Active Directory Basic that is not present in the free edition?

Explanation

Group-based Application access is a feature provided in Azure Active Directory Basic that is not present in the free edition. This feature allows administrators to manage access to cloud applications based on group membership, making it easier to grant and revoke access for multiple users at once. It provides a more efficient and centralized way of managing application access, improving security and simplifying administration tasks.

Submit
42. Match the following
Submit
43. Your school's computer lab has an Active Directory installation . The lab  manager wants you to configure local IT users to be able to authenticate with their existing  domain  credentials to Microsoft Azure . Which technology should you install and  configure ?

Explanation

Active Directory Federation Services (AD FS) should be installed and configured in order to allow local IT users to authenticate with their existing domain credentials to Microsoft Azure. AD FS enables single sign-on (SSO) capabilities, allowing users to access multiple systems and applications with one set of credentials. It establishes a trust relationship between the local Active Directory and Azure Active Directory, enabling users to seamlessly authenticate and access Azure resources using their existing domain credentials.

Submit
44. Work Folder allows users to sync data to their device from their user folder located in their corporation's data center.

Explanation

The given statement states that the Work Folder feature allows users to sync data to their device from their user folder located in their corporation's data center. The correct answer, "No change is needed," implies that the statement is already accurate and does not require any modifications or adjustments.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 20, 2017
    Quiz Created by
    Reem2009_1981
Cancel
  • All
    All (44)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
True Or False...
Which type of information about users does biometrics evaluate?
Microsoft Azure storage solutions replicate four copies of your data...
Which is a feature of Active Directory Rights Management ...
Your company is deploying a new application on employees' personal...
Which Microsoft Intune Company Portal APP platform requires IT...
You have implemented Virtual Desktop Infrastructure ( VDI ) for...
You are an IT intern....
What is an example of the way in which a Trajan horse commonly spreads...
The network has 12 desktop computers and two servers that host a...
To strengthen security, you want to utilize multi-factor...
When you copy a file from one NTFS file system partition to a...
To share media files between your computer and your video game system,...
Your company needs a service that eliminates a single point of failure...
What are two ways to lower the risk of a virus or malware infection?...
Which term describes the security boundary for an organization that...
The president of your university asks you to set up a service website...
Computer worms are different from another type of malware or spyware...
Widows Server Active Directory enables single sin-on , which...
Microsoft Azure Remote App provides the ability to centrally manage...
Match each network to the class of users that can access it.
True Or False Check the right answers
In order to install Microsoft  Intune client software on a...
The windows store allows users of Windows 8 and Windows 8.1 computers...
What are two strategies to lower the risk of a virus infection that is...
Your university's IT department currently has no Active...
You are responsible for managing employee mobile devices at your...
You need to change the permissions of a file. However, the file was...
You want to use Microsoft Azure Backup ....
Match the following
The  OneDrive feature of Microsoft Azure centralizes applications...
A network that is part of your intranet but is extended to users...
What are two types of system-level updates that can be installed...
When you access a file located on a shared resource,...
Organizational Units help you apply data governance for bring your own...
Your company uses Windows 8.1 work folders on personal devices. The...
Which feature of an Azure Application detects failed elements and...
Redundant  Microsoft Azure application is able to meet increased...
True Or False Check the right sentences.
You need to provide a way to allow employees to use their own devices...
Which feature is provided in Azure Active Directory Basic that is not...
Match the following
Your school's computer lab has an Active Directory installation . The...
Work Folder allows users to sync data to their device from their user...
Alert!

Advertisement