Network Security 2

Network Security 2

University

21 Qs

quiz-placeholder

Similar activities

Asesmen Sumatif Infromatika 9 Jaringan Komputer dan Internet

Asesmen Sumatif Infromatika 9 Jaringan Komputer dan Internet

9th Grade - University

20 Qs

IAS 2 Identity and Access Management Q5

IAS 2 Identity and Access Management Q5

University

25 Qs

Chapter 3 Exploring Network Technologies and Tools

Chapter 3 Exploring Network Technologies and Tools

University

20 Qs

josh and tates quiz

josh and tates quiz

KG - University

19 Qs

BCTAA Network Setup Quiz

BCTAA Network Setup Quiz

12th Grade - University

20 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

Network Security

Network Security

University

20 Qs

Episode 16

Episode 16

University

18 Qs

Network Security 2

Network Security 2

Assessment

Quiz

Computers

University

Medium

Created by

يسرا التجاني

Used 3+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of AAA is responsible for verifying a user's identity?

a) Authorization

b) Accounting

c) Authentication

d) None of the above 

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric cryptography, what type of key is used?

a) Public key

b) Private key

c) Same key for both encryption and decryption

d) None of the above 

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies is designed to detect suspicious activities and potential threats within a network?

a) Firewall

b) IDS

c) DMZ

d) VPN 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A DMZ is often used to:

a) Monitor internal network traffic

b) Isolate sensitive internal servers from external access

c) Encrypt data transmissions

d) Create secure tunnels over public networks 

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which secure protocol is used to provide confidentiality, integrity, and authentication at the network layer?

a) TLS

b) IPsec

c) SSH

d) SSL 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

VPNs are primarily used to:

a) Monitor network traffic

b) Detect and prevent intrusions

c) Create secure, encrypted connections over public networks

d) Isolate public-facing servers from the internal network 

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols can be used to encrypt web traffic?

a) HTTP

b) FTP

c) TLS

d) ICMP 

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?