Firewalls and Proxy Servers

Quiz
•
Computers
•
6th Grade
•
Medium
Kyd Tantano Masong
Used 5+ times
FREE Resource
16 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A layer of security to prevent data from being destroyed accidentally or on purpose and to prevent unauthorized access.
Answer explanation
Network security refers to a collection of technologies that protect the usability and integrity of a company's infrastructure by preventing the entry or multiplication of a wide variety of potential threats within a network. This is accomplished by preventing the proliferation of a wide range of threats within a network.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Is a word, phrase, or string of characters that is used to draw a distinction between an authorized user or process and an unauthorized user.
Answer explanation
Keys are basically like passwords.
3.
DRAG AND DROP QUESTION
1 min • 1 pt
The term " (a) " refers to a type of network security equipment that monitors and filters incoming and outgoing network traffic based on the security rules that an organization has already set.
Answer explanation
Firewalls are basically like security guards.
4.
DRAG AND DROP QUESTION
1 min • 1 pt
A (a) is a dedicated computer or software system running on a computer that acts as a middleman between an endpoint device, like a computer, and another server from which a user or client requests a service.
Answer explanation
They are like the people who work in the office, where everything is handled.
5.
DRAG AND DROP QUESTION
1 min • 1 pt
A (a) is a standard security technology that encrypts the link between a server and a client.
"They are like the lock on your house—you need a key to open it and get inside."
Answer explanation
SSL, which stands for "secure sockets layer," is an industry-standard security technology that encrypts the connection that exists between a client and a server.
6.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is a set of rules for sending encrypted data over a network, such as the internet. General use cases include protecting email, VOIP, online transactions, file transfers, and instant messages. This will stop people from listening in on or changing data.
"They're just like the extra locks on your door from the inside. They can help keep people out of your space and keep you safe."
7.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is the process of turning data into a secret code that hides what the data is really about. (b) is the study of how to encrypt and decrypt information.
Answer explanation
In a perfect world, only people who are allowed to can turn ciphertext back into plaintext and get to the original information.
Create a free account and access millions of resources
Similar Resources on Wayground
16 questions
Grade 6 Unit 3 : Network Review

Quiz
•
6th Grade
20 questions
MTA: 98-367 Security Part 1

Quiz
•
KG - Professional Dev...
16 questions
OSI Model

Quiz
•
1st - 10th Grade
13 questions
Cybersecurity

Quiz
•
6th - 8th Grade
20 questions
Technology Knowledge (Computer Safety)

Quiz
•
6th Grade
20 questions
Network Topologies

Quiz
•
1st - 12th Grade
15 questions
Components On Motherboard

Quiz
•
KG - University
16 questions
Networking Concepts

Quiz
•
6th - 7th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
8 questions
Time Management

Quiz
•
6th Grade
15 questions
Acceptable Use Policy (Quiz)

Quiz
•
6th - 8th Grade
25 questions
Career Vs. Job

Quiz
•
6th - 8th Grade
20 questions
Copyright and Fair Use

Quiz
•
6th - 8th Grade
21 questions
Input Output Storage Device

Quiz
•
5th - 8th Grade