Network Security 2

Network Security 2

University

21 Qs

quiz-placeholder

Similar activities

โทโพโลยีเครือข่าย

โทโพโลยีเครือข่าย

University

20 Qs

OSI Model

OSI Model

10th Grade - University

25 Qs

QUIZ KEMANAN JARINGAN

QUIZ KEMANAN JARINGAN

University

20 Qs

Quiz do CCNP ENCOR - capítulos 1 a 4

Quiz do CCNP ENCOR - capítulos 1 a 4

University

21 Qs

Graph Theory Data Structures

Graph Theory Data Structures

University

17 Qs

CSC134 Chapter 7

CSC134 Chapter 7

University

22 Qs

SYO 701 INTRO TO SECURITY Module FC-4

SYO 701 INTRO TO SECURITY Module FC-4

University

20 Qs

Day 8 - Networking & Security I - 1st Review of Day 7

Day 8 - Networking & Security I - 1st Review of Day 7

University

20 Qs

Network Security 2

Network Security 2

Assessment

Quiz

Computers

University

Medium

Created by

يسرا التجاني

Used 3+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of AAA is responsible for verifying a user's identity?

a) Authorization

b) Accounting

c) Authentication

d) None of the above 

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric cryptography, what type of key is used?

a) Public key

b) Private key

c) Same key for both encryption and decryption

d) None of the above 

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies is designed to detect suspicious activities and potential threats within a network?

a) Firewall

b) IDS

c) DMZ

d) VPN 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A DMZ is often used to:

a) Monitor internal network traffic

b) Isolate sensitive internal servers from external access

c) Encrypt data transmissions

d) Create secure tunnels over public networks 

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which secure protocol is used to provide confidentiality, integrity, and authentication at the network layer?

a) TLS

b) IPsec

c) SSH

d) SSL 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

VPNs are primarily used to:

a) Monitor network traffic

b) Detect and prevent intrusions

c) Create secure, encrypted connections over public networks

d) Isolate public-facing servers from the internal network 

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols can be used to encrypt web traffic?

a) HTTP

b) FTP

c) TLS

d) ICMP 

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?