Over the past week, we have covered a lot about the internet, intranet, and extranet all under the network security topic and the quiz below are prepared to see just how much we got to understand. In the world today, where everything is computerized, there is a high need to ensure just how much knowledge you have to offer. Give See moreit a try!
Extranet
Wide area network
VPN
Intranet
Rate this question:
No change is needed
An extranet
A VPN connection
A private network
Rate this question:
Where a user is located
Physical characteristics of user
Phrases a user has memorized
Objects a user carries with him or her
Rate this question:
No change is needed
Swipe pattern
Thumb print
PIN
Rate this question:
Token
Magnetic stripe card
Password
Mobile phone
Rate this question:
It pretends to be a document from a friend .
It inserts copies of itself into other computer programs .
It downloads from an infected web page .
It traverses a network by exploiting a vulnerability .
Rate this question:
Enable the Windows firewall .
Keep the system updated .
Install a download manager .
Use only HTTPS while web surfing .
Rate this question:
Use SSL to access the email service.
Turn the windows firewall on .
Run anti-virus software on the client .
Open attachments only from trusted sources .
Rate this question:
No change is needed
Are embedded inside another program .
Display ads in a web browser
Can self-replicate
Rate this question:
Provides a permissions system that work with any cloud-based storage solution
Manages Digital Rights Management ( DRM ) for digital media
Allows users to define who can open ., modify , print , on forward a document .
Manages share and file permissions on all servers in an enterprise
Rate this question:
No change is needed
ACL
NTFS
Share
Rate this question:
You will be able to read the file
You will be able to delete the file
You will be able to change the file.
Rate this question:
They are the combined permissions of the original file and destination folder
They inherit the permissions of the destination folder.
They remain the same as the original
They are removed , and only the creator is given full control
Rate this question:
Ask the administrator for modify permission to the file .
Have the user grant you the take ownership permission for the file
Add the Restore files and directories privilege to your account.
Change the file permissions by using a file share
Rate this question:
In order to publish the files , internet speed must be at least 50 Kbps .
As many files as necessary may be uploaded but no single file may be larger than 2 GB
The cumulative total file size for the published applications must be smaller than 2 GB
In order to upload the software , the files must be in a zip format .
Rate this question:
No change is needed
Remote Management Users
Power Users
Remote Desktop Users
Rate this question:
No change is needed .
Microsoft SharePoint
The Microsoft Intune Company portal APP
The system Center configuration manager company portal App
Rate this question:
No change is needed
System Center 2012 R2 Configuration Manager
Microsoft Virtual Desktop Infrastructure ( VDI )
Microsoft Azure Service Bus
Rate this question:
Windows Phone 8.1
IOS
Windows Rt
Android
Rate this question:
Enable selective wipe , and secure file transfers with SSL
Enable selective wipe , and enforce encryption .
Enable selective wipe , and enforce a lock screen and password
Enforce encryption , and enforce a lock screen and password .
Rate this question:
Windows Intune provides support for your Own Device ( BYOD ) policies all platforms Including linux .
Windows Intune integrates with existing system center 2012 R2 configuration Manager deployments
Windows Intune lets you manage devices to protect corporate assets by using configuration policies and remote wipe .
Rate this question:
Active Directory
Microsoft Intune
Microsoft OneDrive
Microsoft Azure
Rate this question:
No change is needed
Two
Three
Six
Rate this question:
Redundancy
Fault tolerance
Scalability
Disaster recovery
Rate this question:
No change is needed
Highly available
Fault tolerant
Scalable
Rate this question:
HDInsight
Scalability
High availability
Backup
Rate this question:
You can create a Microsoft Azure virtual machine by using a platform image.
You can create a Microsoft Azure virtual machine by using your own image
You can create a Microsoft Azure virtual machine by using your own disk
Rate this question:
A certificate with an encryption key that is at least 256 bits
A wildcard certificate in the Microsoft.com domain
A certificate from a CA that is trusted by Microsoft
A self-signed certificate
Rate this question:
Active Directory Certificate Services
Active Directory Federation Services
Azure Active Directory
Active Directory Lightweight Directory Services
Rate this question:
Active Directory Lightweight Directory Services
Azure Active Directory
Active Directory Federation Services
Active Directory Domain Services
Rate this question:
No change is needed
Microsoft Account
Active Directory Rights Management
Azure Active Directory
Rate this question:
Global catalog
Organizational unit
Forest
Universal group
Rate this question:
Advanced Anomaly Security reports ( machine learning-based)
Multi-Factor Authentication service for cloud users
Self-Service password Reset for cloud applications
Group-based Application access
Rate this question:
No change is needed
Workplace Join
Mobile Device Management
OneDrive
Rate this question:
Work Folders
Workplace Join
Virtual Desktop Infrastructure ( VDI )
VPN
Rate this question:
No change is needed
Virtual Machines
Virtual network
RemoteApp
Rate this question:
Microsoft Virtual Desktop Infrastructure
Windows live services
Office365
Microsoft intune
Rate this question:
Folder Replication
Windows To Go
Auto-Triggered VPN
Work Folder
No change is needed
File security and Access Rights help
Active Directory groups help
Dynamic access control helps
Rate this question:
Microsoft office updates
Side-loaded updates
Surface firmware updates
Windows software updates
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.