D4 WorkBook - Quizzez

D4 WorkBook - Quizzez

12th Grade

12 Qs

quiz-placeholder

Similar activities

SLR11: Networks and Protocols

SLR11: Networks and Protocols

12th Grade

15 Qs

CTec level 3 Unit 2 LO1 and 2

CTec level 3 Unit 2 LO1 and 2

12th Grade

15 Qs

Network Fundamentals-Introduction to Networks Part 2

Network Fundamentals-Introduction to Networks Part 2

9th Grade - University

9 Qs

Basic Network Architecture

Basic Network Architecture

12th Grade - University

10 Qs

Module 5: Understanding Wired and Wireless Networks

Module 5: Understanding Wired and Wireless Networks

9th Grade - University

15 Qs

Settings Pt.2

Settings Pt.2

9th - 12th Grade

15 Qs

Virtual Storage (H446)

Virtual Storage (H446)

12th Grade

13 Qs

Chapter 4 Test Review

Chapter 4 Test Review

9th - 12th Grade

14 Qs

D4 WorkBook - Quizzez

D4 WorkBook - Quizzez

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Muzhgan Manati

Used 5+ times

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A firewall is a gatekeeper between a(n) ______ and the outside world.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Depending on the level of security one wants for a network, one can block all incoming connections, including those in the list of allowed ____________.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

One of the most common forms of user authentication is a username and --------.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

___________ authentication helps to provide additional security to an account by requiring two or more credentials to be entered when signing in.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Bring-your-own-device (BYOD) mobile devices are most common among --------- businesses that ask their employees to supply their devices to work from or make phone calls.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Whether the company utilizes bring-your-own-device (BYOD) or corporate-managed devices, it must create a strong ------------- policy to protect devices against unauthorized users gaining access to technology or data.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A virus must be attached to a(n) __________ to spread.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?