A layer of security to prevent data from being destroyed accidentally or on purpose and to prevent unauthorized access.
Firewalls and Proxy Servers

Quiz
•
Computers
•
6th Grade
•
Medium
Kyd Tantano Masong
Used 5+ times
FREE Resource
16 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Answer explanation
Network security refers to a collection of technologies that protect the usability and integrity of a company's infrastructure by preventing the entry or multiplication of a wide variety of potential threats within a network. This is accomplished by preventing the proliferation of a wide range of threats within a network.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Is a word, phrase, or string of characters that is used to draw a distinction between an authorized user or process and an unauthorized user.
Answer explanation
Keys are basically like passwords.
3.
DRAG AND DROP QUESTION
1 min • 1 pt
The term " (a) " refers to a type of network security equipment that monitors and filters incoming and outgoing network traffic based on the security rules that an organization has already set.
Answer explanation
Firewalls are basically like security guards.
4.
DRAG AND DROP QUESTION
1 min • 1 pt
A (a) is a dedicated computer or software system running on a computer that acts as a middleman between an endpoint device, like a computer, and another server from which a user or client requests a service.
Answer explanation
They are like the people who work in the office, where everything is handled.
5.
DRAG AND DROP QUESTION
1 min • 1 pt
A (a) is a standard security technology that encrypts the link between a server and a client.
"They are like the lock on your house—you need a key to open it and get inside."
Answer explanation
SSL, which stands for "secure sockets layer," is an industry-standard security technology that encrypts the connection that exists between a client and a server.
6.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is a set of rules for sending encrypted data over a network, such as the internet. General use cases include protecting email, VOIP, online transactions, file transfers, and instant messages. This will stop people from listening in on or changing data.
"They're just like the extra locks on your door from the inside. They can help keep people out of your space and keep you safe."
7.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is the process of turning data into a secret code that hides what the data is really about. (b) is the study of how to encrypt and decrypt information.
Answer explanation
In a perfect world, only people who are allowed to can turn ciphertext back into plaintext and get to the original information.
Create a free account and access millions of resources
Similar Resources on Wayground
19 questions
Y7 - Cybersecurity

Quiz
•
6th Grade
20 questions
Quiz - Cryptography & WWII and Technology (Video 2 & 3.1 - 3.6)

Quiz
•
6th - 7th Grade
16 questions
iGCSE Computer Science: Networks

Quiz
•
KG - University
17 questions
Jenis Server & Sistem Pengoperasian Pelayan

Quiz
•
6th - 7th Grade
16 questions
Network topologies

Quiz
•
1st - 7th Grade
20 questions
Year 6 Computing Revision Quiz

Quiz
•
6th Grade
15 questions
GE 10 - MODULE 3 THE WEB AND THE INTERNET

Quiz
•
KG - University
15 questions
Elements of Digital Citizenship

Quiz
•
5th - 8th Grade
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade