Quiz Complete, well Done!
Which of the following is a common social engineering attack?
network security audit
Security policy
Which of the following is NOT an example of network protection software?
What is the first line of defense in network protection?
Regularly updating software and
vulnerabilities is important for network security.
Firewall
penetration testing
Two-factor authentication
Which of the following is a common security vulnerability in network infrastructure?
A
is a type of malicious software that can spread across a network.
What are some common network monitoring tools?
The most common way to protect a network is by using a
.
What is an incident response plan?
Which of the following is the best definition of network protection?
Antivirus
Training and awareness programs help to educate employees about their roles and responsibilities in the incident response
.
Phishing is a technique used by hackers to
sensitive information.
Which of the following is an example of a network security breach?
What does VPN stand for?