FINAL EXAM INTRODUCTION TO SECURITY

FINAL EXAM INTRODUCTION TO SECURITY

11th Grade

30 Qs

quiz-placeholder

Similar activities

SOAL AIJ KELAS XII TKJ

SOAL AIJ KELAS XII TKJ

11th - 12th Grade

30 Qs

Keamanan Jaringan

Keamanan Jaringan

11th Grade

25 Qs

IT Fundamentals:  6.0 Security

IT Fundamentals: 6.0 Security

11th - 12th Grade

29 Qs

Module 1.1: Common Threats

Module 1.1: Common Threats

11th Grade - University

25 Qs

IT Essentials ver 7.0 Chapter 13 Security

IT Essentials ver 7.0 Chapter 13 Security

11th Grade - University

28 Qs

Networking Ch 6 - Firewalls

Networking Ch 6 - Firewalls

9th - 12th Grade

25 Qs

Networks

Networks

11th - 12th Grade

28 Qs

Keamanan Jaringan 1

Keamanan Jaringan 1

11th Grade

25 Qs

FINAL EXAM INTRODUCTION TO SECURITY

FINAL EXAM INTRODUCTION TO SECURITY

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Alaqsha Gilang

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following firewalls hides or masquerades the private addresses of network hosts?

  • Reverse proxy firewall

Network Address Translation Firewall

  • Proxy server

  • Network layer firewall

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?

  • Scalability

  • Availability

Confidentiality

  • Integrity

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

  • Scalability

  • Integrity

  • Confidentiality

Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?

  • Weaknesses in security practices

  • Race conditions

Access control problems

  • Buffer overflow

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best way to avoid getting spyware on a machine?

  • Install the latest antivirus updates

  • Install the latest web browser updates

Install software only from trusted websites

Install the latest operating system updates

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?

That the Bluetooth adapter is disabled

If the laptop requires user authentication for file and media sharing

That the laptop web browser is operating in private mode

If the laptop has a master password set to secure the passwords stored in the password manager

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?

  • Application layer firewall

  • Transport layer firewall

Reverse proxy server

 Network layer firewall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?