BAB 11

BAB 11

University

20 Qs

quiz-placeholder

Similar activities

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

202309 BMIT27x3 Revision Quiz 2

202309 BMIT27x3 Revision Quiz 2

University

20 Qs

SURVEILLANCE CONTROL SYSTEM

SURVEILLANCE CONTROL SYSTEM

University

15 Qs

CompTIA Sec+

CompTIA Sec+

University - Professional Development

20 Qs

Week 11 Quiz 2

Week 11 Quiz 2

10th Grade - University

20 Qs

Quiz on Malware and Cybersecurity

Quiz on Malware and Cybersecurity

12th Grade - University

18 Qs

CryptoQuiz

CryptoQuiz

University

15 Qs

Chapter 11: Security and Privacy

Chapter 11: Security and Privacy

10th Grade - University

24 Qs

BAB 11

BAB 11

Assessment

Quiz

Computers

University

Medium

Created by

amira akifah

Used 37+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the primary goals of network security?

Speed, cost, usability

Integrity, availability, confidentiality

Encryption, authentication, usability

Complexity, efficiency, flexibility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a security threat?

Virus

Firewall

Trojan horse

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a firewall in network security?

Prevents unauthorized access to a network

Detects and removes malware

Encrypts all data in a network

Increases internet speed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves sending packets with a fake source address?

DDoS attack

IP Spoofing

Phishing

Man-in-the-Middle attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to encrypt data in a VPN?

HTTPS

IPSec

FTP

SMTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method for user authentication?

Biometrics

Phishing

DDoS

Malware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a denial-of-service (DoS) attack?

An attack that infects a computer with a virus

An attack that prevents users from accessing a system

A method of encrypting data

A technique used to create secure passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?