Search Header Logo

esafas

Authored by johnrich clemente

Other

University

Used 3+ times

esafas
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Deals with the fundamental human rights of a person’s privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.

Internet Privacy

Network Security

Network Technologies

Different Techniques to Protect Internet Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It ensures the integrity, confidentiality, and accessibility of computer networks. It is relevant when cybercriminals are becoming more dominant in exploiting new users and enterprises, then it is vital to take extra precautions to avoid any data breach.

Network Security

Network Technologies

Internet Privacy

Data Privacy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It was previously stated that it monitors and filters incoming and outgoing network traffic.

Firewall

Intrusion Detection System (IDS)

Wi-Fi Protected Access 3 (WPA3)

Virtual Private Network (VPN)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.

Intrusion Detection System (IDS)

Firewall

Virtual Private Network (VPN)

Email Security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the latest wireless network security certificate protocol by the Wi- Fi alliance. It focuses its filtering at the “entry” when a new device requests to connect to the network.

Wi-Fi Protected Access 3 (WPA3)

Virtual Private Network (VPN)

Intrusion Detection System (IDS)

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It connects any remote device to an enterprise server wherein company data is hosted. 1It piggybacks on a public network to directly access the server, ensuring that the users' online activities are publicly hidden

Intrusion Detection System (IDS)

Wi-Fi Protected Access 3 (WPA3)

Virtual Private Network (VPN)

Email Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As emails allow scripts to be embedded inside the device, it is easier for anyone to write a code, attach it to an email, then send it. Receivers tend to click this email which can comprise the device.

Email Security

Double-checking Unfamiliar Links

Using Multi-factor Authentication

Virtual Private Network (VPN)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?