Network Security Fundamentals Quiz

Network Security Fundamentals Quiz

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

OCR J277 1. 4 - Network Security and Threats Quiz

OCR J277 1. 4 - Network Security and Threats Quiz

10th Grade

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

Network Security Measures Quiz

Network Security Measures Quiz

11th Grade

10 Qs

Cybersecurity2

Cybersecurity2

12th Grade

20 Qs

As/A Level  CS 9Chpt_6: Security, Privacy, and Integrity of Data

As/A Level CS 9Chpt_6: Security, Privacy, and Integrity of Data

11th Grade

15 Qs

Database Security Quiz

Database Security Quiz

11th Grade

15 Qs

Principles of IT Vocabulary A-J

Principles of IT Vocabulary A-J

7th Grade - University

10 Qs

Network Security Fundamentals Quiz

Network Security Fundamentals Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Steven Hahn

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for?

Control, Intelligence, Awareness

Confidentiality, Intelligence, Access

Confidentiality, Integrity, Availability

Control, Integrity, Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a measure to ensure confidentiality?

Two-factor authentication

Encryption

User access policies

Biometric verification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of integrity in information security?

To provide reliable access to data

To protect data from unauthorized access

To ensure the network is available at all times

To protect data and resources from unauthorized changes

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a countermeasure for external threats?

Internal segmentation

Strong firewalls

Employee training

Database monitoring

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does availability ensure in the context of the CIA triad?

Data and resources are not altered without authorization

Data is hidden from unauthorized users

Data is encrypted and secure

Authorized users have reliable access to data and resources

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered an internal threat?

Insider mistakes

Malware

Viruses

Trojan horses

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Common Vulnerabilities and Exposures (CVE) List?

To catalog all antivirus software

To offer a database of strong firewalls

To list all external and internal threats

To provide a centralized resource for known vulnerabilities

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?