Deals with the fundamental human rights of a person’s privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.

esafas

Quiz
•
Other
•
University
•
Easy
johnrich clemente
Used 3+ times
FREE Resource
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Internet Privacy
Network Security
Network Technologies
Different Techniques to Protect Internet Privacy
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It ensures the integrity, confidentiality, and accessibility of computer networks. It is relevant when cybercriminals are becoming more dominant in exploiting new users and enterprises, then it is vital to take extra precautions to avoid any data breach.
Network Security
Network Technologies
Internet Privacy
Data Privacy
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It was previously stated that it monitors and filters incoming and outgoing network traffic.
Firewall
Intrusion Detection System (IDS)
Wi-Fi Protected Access 3 (WPA3)
Virtual Private Network (VPN)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.
Intrusion Detection System (IDS)
Firewall
Virtual Private Network (VPN)
Email Security
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is the latest wireless network security certificate protocol by the Wi- Fi alliance. It focuses its filtering at the “entry” when a new device requests to connect to the network.
Wi-Fi Protected Access 3 (WPA3)
Virtual Private Network (VPN)
Intrusion Detection System (IDS)
Firewall
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It connects any remote device to an enterprise server wherein company data is hosted. 1It piggybacks on a public network to directly access the server, ensuring that the users' online activities are publicly hidden
Intrusion Detection System (IDS)
Wi-Fi Protected Access 3 (WPA3)
Virtual Private Network (VPN)
Email Security
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As emails allow scripts to be embedded inside the device, it is easier for anyone to write a code, attach it to an email, then send it. Receivers tend to click this email which can comprise the device.
Email Security
Double-checking Unfamiliar Links
Using Multi-factor Authentication
Virtual Private Network (VPN)
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is the best way to have Internet privacy. It does not just change the IP address; it also protects incoming and outgoing Internet traffic with extensive encryption.
Using a Virtual Private Network (VPN)
Using Multi-factor Authentication
Securing Web Browser
Double-checking Unfamiliar Links
9.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
is an added verification step besides a conventional password. Google applies this wherein the users must provide a specific code sent to their smartphones to access their accounts.
Using a Virtual Private Network (VPN)
Using Multi-factor Authentication
Intrusion Detection System (IDS)
Wi-Fi Protected Access 3 (WPA3)
Similar Resources on Quizizz
10 questions
SURVEY - TECHNOLOGY

Quiz
•
University
10 questions
Big Data

Quiz
•
University
10 questions
CHAPTER 12 YGY

Quiz
•
University
12 questions
Test Your Knowledge

Quiz
•
University
12 questions
Social Networks

Quiz
•
University
8 questions
sic1

Quiz
•
University
14 questions
NSTP-CWTS Quiz

Quiz
•
University
5 questions
CyberSaavy

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade