INTRODUCTION TO NETWORK SECURITY & COMPUTER

INTRODUCTION TO NETWORK SECURITY & COMPUTER

1st - 10th Grade

10 Qs

quiz-placeholder

Similar activities

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

10.2 Cybersecurity

10.2 Cybersecurity

9th - 12th Grade

14 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Cyber Security Quiz

Cyber Security Quiz

1st - 5th Grade

10 Qs

Implications of Cloud Technologies

Implications of Cloud Technologies

10th - 11th Grade

15 Qs

INTRODUCTION TO NETWORK SECURITY & COMPUTER

INTRODUCTION TO NETWORK SECURITY & COMPUTER

Assessment

Quiz

Computers

1st - 10th Grade

Hard

Created by

NOR HANINA

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WHAT IS COMPUTER SECURITY

measures to protect data during transmission across the network.

generic name for the collection of tools designed to protect data and to prevent hackers.

measures to protect data during their transmission over a collection of interconnected networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Three aspects of information security EXCEPT:

security attack

SECURITY MECHANISM

SECURITY SERVICES

NETWORK SECURITY

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY ATTACK:

ANY ACTION THAT COMPROMISES THE SECURITY OF INFORMATION THAT OWNED BY ORGANIZATION

A MECHANISM THAT IS DESIGNED TO DETECT,TO PREVENT OR RECOVER FROM SECURITY ATTACK

A SERVICES THAT ENHANCES THE SECURITY OF DATA PROCESSING SYSTEM AND INFORMATION TRANSFER

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY SERVICES EXCEPT

CONFIDENTIALITY

AUTHENTICATION

NON REPUDIATION

INTERCEPTION

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SECURITY ATTACK

AUTHENTICATION

MODIFICATION

FABRICATION

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Modification of data stream

PAASIVE ATTACK

ACTIVE ATTACK

MODIFY ATTACK

SECURITY ATTACK

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

programs can be installed on computer systems to observe traffic, storing information (ID/Passwords) that can be used to access other systems.

DENIAL OF SERVICES

HACKING

SNIFFING

PORT SCANNING

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?