Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

University

10 Qs

quiz-placeholder

Similar activities

Chapter 27

Chapter 27

University

10 Qs

Initial Assessment - CompTIA IT fundamentals

Initial Assessment - CompTIA IT fundamentals

University

10 Qs

Networking

Networking

University

15 Qs

Computing Y7 Lesson4 Quiz

Computing Y7 Lesson4 Quiz

12th Grade - University

10 Qs

3.4 Network Hardware Cambridge IGCSE 0478

3.4 Network Hardware Cambridge IGCSE 0478

10th Grade - University

11 Qs

Principles of IT Vocabulary A-J

Principles of IT Vocabulary A-J

7th Grade - University

10 Qs

Network devices

Network devices

University

10 Qs

Litle surprise

Litle surprise

University

9 Qs

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Assessment

Quiz

Computers

University

Easy

Created by

Yusof Intan

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

1. What is the purpose of a password policy?

a) To enforce the use of strong passwords

b) To limit the number of users on a network

c) To control network traffic

d) To encrypt data

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

2. What is the term used for a malicious program that spreads from one computer to another without user intervention?

a) Virus

b) Firewall

c) Encryption

d) Router

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

3. Which of the following is NOT a recommended practice for securing a wireless network?

 a) Enabling encryption (e.g., WPA2)

b) Disabling SSID broadcasting

c) Changing the default administrator password

d) Placing the wireless router in an open and easily accessible location

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

4. What is the purpose of two-factor authentication?

a) To protect against physical threats

b) To control network traffic

c) To encrypt data

d) To add an extra layer of security by requiring two forms of identification

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

5. What is a phishing attack?

  

  

   

a) A physical intrusion into a network

b) An attempt to gain unauthorized access to a network

c) A social engineering technique to trick users into revealing sensitive information

d) A type of malware that replicates itself on a network

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

6. What is the purpose of a VPN (Virtual Private Network)?

a) To protect against physical threats

  

b) To control network traffic

   

c) To encrypt data and provide secure remote access to a private network

d) To store sensitive information

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

7. Which of the following is an example of a strong password?

a) Password123

b) 12345678

   

c) P@ssw0rd!

 

d) MyDog'sName

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?