Security

Security

University

6 Qs

quiz-placeholder

Similar activities

Understanding Email, Contacts and Calendaring

Understanding Email, Contacts and Calendaring

University

10 Qs

BB

BB

University

10 Qs

Tree and Planar Graph

Tree and Planar Graph

University

10 Qs

CodeMonkey for B.Ed IT

CodeMonkey for B.Ed IT

University

10 Qs

JRB2 Quiz 4

JRB2 Quiz 4

University

10 Qs

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

University

10 Qs

JAVA QUIZ-1

JAVA QUIZ-1

University

10 Qs

Data, AI and ML with CloudSeekho

Data, AI and ML with CloudSeekho

University - Professional Development

10 Qs

Security

Security

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Dustin Dummer

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves a "threat actor" gaining physical access to a device and using that device to capture data transmitting between devices?

Denial-of-service

Routing attack

Man-in-the-middle attack

Eavesdropping attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of security attack prevents users from accessing a website by sending large numbers of link requests in a short period of time?

Disruption of service

Data loss

Identity theft

Information theft

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security attack involves obtaining trade secret documents illegally?

Information theft

Identity theft

Data loss

Disruption of service

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the network security authentication process?

To determine which resources a user can access.

To keep track of the actions of a user.

To provide challenge and response questions.

To require users to prove who they are.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which firewall feature is ensures that every packet coming into a network is a legitimate response to requests initiated from internal hosts?

Application filtering

URL filtering

Stateful packet inspection

Address filtering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What network security device provides an encrypted method of authentication for remote users into a network?

Security Appliance Server (SAS)

Intrusion Prevention System (IPS)

Firewall

VPN (Virtual Private Network)