Search Header Logo

Network Security Secure Protocols & Defense in Depth

Authored by Steven Hahn

Computers

9th - 12th Grade

Used 1+ times

Network Security Secure Protocols & Defense in Depth
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is considered secure for transferring files?

RCP

TFTP

SFTP

FTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does HTTPS use to encrypt data before transmission?

TLS

PAP

SSH

SSL

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a secure protocol?

SSH

SSL

TLS

HTTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main benefit of the principle of least privilege?

Simplifies network topology

Reduces the risk of data breaches

Increases user satisfaction

Improves system performance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is designed for secure interactive control of remote systems?

HTTP

FTP

SNMP

SSH

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SNMPv3 add over its predecessors?

Simpler configuration

Higher bandwidth efficiency

Authentication and encryption

Faster data transfer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method assigns permissions based on user roles?

RBAC

ACL

DAC

MAC

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?