Викторина по сетевой безопасности

Викторина по сетевой безопасности

University

8 Qs

quiz-placeholder

Similar activities

Operating and application systems

Operating and application systems

12th Grade - University

10 Qs

How Cyber Safe Are You?

How Cyber Safe Are You?

University

10 Qs

Network secutiry

Network secutiry

9th Grade - University

10 Qs

Basics of Network and Internet Safety

Basics of Network and Internet Safety

10th Grade - University

10 Qs

Basic ICT quiz

Basic ICT quiz

University

10 Qs

Network Security Quiz

Network Security Quiz

University

13 Qs

CLC Lesson 8&9 Quiz

CLC Lesson 8&9 Quiz

University

12 Qs

115 CND M15 Network Logs Monitoring

115 CND M15 Network Logs Monitoring

University

6 Qs

Викторина по сетевой безопасности

Викторина по сетевой безопасности

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Teili Makasheva

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the CIA triad in information security?

Confidentiality, Integrity, Availability

Confidentiality, Identification, Authentication

Integrity, Availability, Protection

Authentication, Authorization, Accounting

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following methods is used to ensure data integrity?

File protection

Hashing

Encryption

Authentication

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of access control prevents physical access to systems?

Logical access

Physical access

Network access

Administrative access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is multi-factor authentication?

Use of biometric data

Use of smart cards

Use of only a password

Use of two or more verification methods

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of firewall analyzes the state of connections?

Application gateway

Packet filter

Hybrid firewall

Stateful firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods is used to protect against malware?

File system

Antivirus software

Firewall

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods is used to protect against DDoS attacks?

Authentication

Traffic monitoring

Encryption

Backups

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a VPN?

To block malware

To manage network traffic

To provide anonymity online

To increase internet speed