uNIT 3: dATA PROTECTION

uNIT 3: dATA PROTECTION

University

5 Qs

quiz-placeholder

Similar activities

INTRODUCTION TO BIM

INTRODUCTION TO BIM

University

10 Qs

Proxy Server

Proxy Server

University

10 Qs

The OOP Quiz

The OOP Quiz

University

10 Qs

Topic 3: switch statement

Topic 3: switch statement

University

10 Qs

C Programming Control Structures

C Programming Control Structures

University

10 Qs

PTI QUIZ 2

PTI QUIZ 2

2nd Grade - University

10 Qs

Administración BD - Roles

Administración BD - Roles

University

10 Qs

CMP128 Java Ch. 03 Decisions

CMP128 Java Ch. 03 Decisions

University

10 Qs

uNIT 3: dATA PROTECTION

uNIT 3: dATA PROTECTION

Assessment

Quiz

Computers

University

Easy

Created by

Abhishek Pandey

Used 3+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The two most common security postures are referred to as ____________and __________________. ________ .

Default DENY, Default ALLOW

Default STOP, Default ALLOW

Default WAIT, Default ALLOW

ALL

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ admits or denies traffic attempting to access the network based on predefined rules.

Packet filtering

Content Filtering

Filtering

ALL

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

. ________is the use of biological markers to determine identity.

Biometrics

Cryptography

Forensics

Steganography

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is the encoding of data so that the plain text is transformed into something unintelligible, called _______________________

Cipher text

Biometrics

Biometrics TEXT

ALL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________are programs that seem innocuous but are reallymalicious codes.

Trojan horses

Worms

Worms

all