Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

University

10 Qs

quiz-placeholder

Similar activities

Understanding Network Protocols and Layers

Understanding Network Protocols and Layers

9th Grade - University

13 Qs

Security+ SY0-701

Security+ SY0-701

University

15 Qs

ACN CDN

ACN CDN

University

10 Qs

Quick Revision H466 #1

Quick Revision H466 #1

12th Grade - University

15 Qs

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

Data Communication & Networking Quiz

Data Communication & Networking Quiz

University

15 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Assessment

Quiz

Computers

University

Easy

Created by

Intan Yusof

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

1. What is the purpose of a password policy?

a) To enforce the use of strong passwords

b) To limit the number of users on a network

c) To control network traffic

d) To encrypt data

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

2. What is the term used for a malicious program that spreads from one computer to another without user intervention?

a) Virus

b) Firewall

c) Encryption

d) Router

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

3. Which of the following is NOT a recommended practice for securing a wireless network?

 a) Enabling encryption (e.g., WPA2)

b) Disabling SSID broadcasting

c) Changing the default administrator password

d) Placing the wireless router in an open and easily accessible location

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

4. What is the purpose of two-factor authentication?

a) To protect against physical threats

b) To control network traffic

c) To encrypt data

d) To add an extra layer of security by requiring two forms of identification

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

5. What is a phishing attack?

  

  

   

a) A physical intrusion into a network

b) An attempt to gain unauthorized access to a network

c) A social engineering technique to trick users into revealing sensitive information

d) A type of malware that replicates itself on a network

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

6. What is the purpose of a VPN (Virtual Private Network)?

a) To protect against physical threats

  

b) To control network traffic

   

c) To encrypt data and provide secure remote access to a private network

d) To store sensitive information

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

7. Which of the following is an example of a strong password?

a) Password123

b) 12345678

   

c) P@ssw0rd!

 

d) MyDog'sName

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?