BSIT 3A (IAS) Quiz 2 for finals

BSIT 3A (IAS) Quiz 2 for finals

University

10 Qs

quiz-placeholder

Similar activities

Chapter 8 Study Guide!

Chapter 8 Study Guide!

KG - University

14 Qs

Cybersecurity Basics Quiz

Cybersecurity Basics Quiz

6th Grade - University

15 Qs

Proxy Server

Proxy Server

University

10 Qs

Security Principles Quiz

Security Principles Quiz

University

15 Qs

MAF682 TECHNOLOGY AND CYBER RISKS

MAF682 TECHNOLOGY AND CYBER RISKS

University

10 Qs

Certified Ethical Hacker 4

Certified Ethical Hacker 4

University

10 Qs

Pre-Quiz (ITN: 1.1)

Pre-Quiz (ITN: 1.1)

University

12 Qs

Quiz: Topic 1.1

Quiz: Topic 1.1

University

12 Qs

BSIT 3A (IAS) Quiz 2 for finals

BSIT 3A (IAS) Quiz 2 for finals

Assessment

Quiz

Other

University

Medium

Created by

Ma'am Vasquez

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a firewall?

To store data securely

To filter and control network traffic

To increase internet speed

To encrypt data transmission

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a host-based firewall?

Protects all devices in a network

Installed on individual computers

Requires no configuration

Functions without security rules

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one advantage of a firewall?

Allows all network traffic by default

Concentrates security for easier management

Eliminates the need for passwords

Automatically updates all software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a type of authentication?

Password-based

Address-based

Cryptography-based

DNS-based

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three main factors used in authentication?

What you know, what you have, what you are

What you see, what you trust, what you do

What you own, what you see, what you control

What you build, what you say, what you buy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of biometric authentication?

Password

Keycard

Fingerprint

IP address

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one disadvantage of using a firewall?

It can block certain types of network access

It prevents malware installation

It cannot be configured for specific protocols

It makes systems immune to attacks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?