esafas

esafas

University

9 Qs

quiz-placeholder

Similar activities

Pertemuan 4

Pertemuan 4

University

10 Qs

MPU24021 KELAB - TUNJUKCARA (Introduction to Network)

MPU24021 KELAB - TUNJUKCARA (Introduction to Network)

University

7 Qs

Virtualization and Cloud Computing

Virtualization and Cloud Computing

12th Grade - University

11 Qs

Test di verifica su Social network e relazione educativa

Test di verifica su Social network e relazione educativa

12th Grade - University

10 Qs

Switching Methods

Switching Methods

University

10 Qs

Robo Soccer

Robo Soccer

University

13 Qs

Network Security Quiz

Network Security Quiz

University

10 Qs

LITE Lesson 04_IT Trends, Issues, and Challenges Quiz

LITE Lesson 04_IT Trends, Issues, and Challenges Quiz

University

10 Qs

esafas

esafas

Assessment

Quiz

Other

University

Easy

Created by

johnrich clemente

Used 3+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Deals with the fundamental human rights of a person’s privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.

Internet Privacy

Network Security

Network Technologies

Different Techniques to Protect Internet Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It ensures the integrity, confidentiality, and accessibility of computer networks. It is relevant when cybercriminals are becoming more dominant in exploiting new users and enterprises, then it is vital to take extra precautions to avoid any data breach.

Network Security

Network Technologies

Internet Privacy

Data Privacy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It was previously stated that it monitors and filters incoming and outgoing network traffic.

Firewall

Intrusion Detection System (IDS)

Wi-Fi Protected Access 3 (WPA3)

Virtual Private Network (VPN)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.

Intrusion Detection System (IDS)

Firewall

Virtual Private Network (VPN)

Email Security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the latest wireless network security certificate protocol by the Wi- Fi alliance. It focuses its filtering at the “entry” when a new device requests to connect to the network.

Wi-Fi Protected Access 3 (WPA3)

Virtual Private Network (VPN)

Intrusion Detection System (IDS)

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It connects any remote device to an enterprise server wherein company data is hosted. 1It piggybacks on a public network to directly access the server, ensuring that the users' online activities are publicly hidden

Intrusion Detection System (IDS)

Wi-Fi Protected Access 3 (WPA3)

Virtual Private Network (VPN)

Email Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As emails allow scripts to be embedded inside the device, it is easier for anyone to write a code, attach it to an email, then send it. Receivers tend to click this email which can comprise the device.

Email Security

Double-checking Unfamiliar Links

Using Multi-factor Authentication

Virtual Private Network (VPN)

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the best way to have Internet privacy. It does not just change the IP address; it also protects incoming and outgoing Internet traffic with extensive encryption.

Using a Virtual Private Network (VPN)

Using Multi-factor Authentication

Securing Web Browser

Double-checking Unfamiliar Links

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is an added verification step besides a conventional password. Google applies this wherein the users must provide a specific code sent to their smartphones to access their accounts.

Using a Virtual Private Network (VPN)

Using Multi-factor Authentication

Intrusion Detection System (IDS)

Wi-Fi Protected Access 3 (WPA3)