security in IT

security in IT

University

12 Qs

quiz-placeholder

Similar activities

System Software 2

System Software 2

University

10 Qs

Test unit2  Install an electricity and Usage

Test unit2 Install an electricity and Usage

University

15 Qs

Google Cloud Platform

Google Cloud Platform

University

8 Qs

Basic Computer 2

Basic Computer 2

University

13 Qs

Career Skills Assessment

Career Skills Assessment

8th Grade - University

10 Qs

Exploring Computer Networks

Exploring Computer Networks

12th Grade - University

15 Qs

Health and safety

Health and safety

10th Grade - Professional Development

10 Qs

Classroom Vocab

Classroom Vocab

University

16 Qs

security in IT

security in IT

Assessment

Quiz

English

University

Medium

CCSS
RI.9-10.4, RI.11-12.8, RI.11-12.4

+6

Standards-aligned

Created by

Natalia Estrada

Used 21+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacks on a computer from the internet.

FIREWALLS

CYBERATTACK

NETWORK PERIMETER

HACKERS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who try to gain illegal access to a computer system.

HACKERS

NETWORK PERIMETER

GATEWAY

CYBERATTACKS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The network boundary between a private user network and the internet

SECURE SOCKET LAYER

TWO-FACTOR AUTHENTICATION

GATEWAY

NETWORK PERIMETER

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a hardware device that acts as a "gate" between two networks.

HACKERS

GATEWAY

SECURE SOCKET LAYER

FIREWALLS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a network security software that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules

SECURE SOCKET LAYER

FIREWALLS

NETWORK PERIMETER

HACKERS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ________ has an Internet connection on one side, and some sort of LAN connection on the other.

GATEWAY

TWO-FACTOR AUTHENTICATION 2FA

SECURE SOCKET LAYER

NETWORK PERIMETER

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To give two independent forms of identification

HACKERS

TWO-FACTOR AUTHENTICATION

SECURE SOCKET LAYER

FIREWALLS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?