BAB 11

BAB 11

University

20 Qs

quiz-placeholder

Similar activities

security best practices

security best practices

10th Grade - University

20 Qs

Wireless Network Security

Wireless Network Security

University

20 Qs

Operating System Security Quiz

Operating System Security Quiz

University

20 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

220 1002 A+ 75-90

220 1002 A+ 75-90

University

15 Qs

Hackers?

Hackers?

University

20 Qs

Information Security Quiz

Information Security Quiz

University

21 Qs

BAB 11

BAB 11

Assessment

Quiz

Computers

University

Medium

Created by

amira akifah

Used 37+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the primary goals of network security?

Speed, cost, usability

Integrity, availability, confidentiality

Encryption, authentication, usability

Complexity, efficiency, flexibility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a security threat?

Virus

Firewall

Trojan horse

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a firewall in network security?

Prevents unauthorized access to a network

Detects and removes malware

Encrypts all data in a network

Increases internet speed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves sending packets with a fake source address?

DDoS attack

IP Spoofing

Phishing

Man-in-the-Middle attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to encrypt data in a VPN?

HTTPS

IPSec

FTP

SMTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method for user authentication?

Biometrics

Phishing

DDoS

Malware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a denial-of-service (DoS) attack?

An attack that infects a computer with a virus

An attack that prevents users from accessing a system

A method of encrypting data

A technique used to create secure passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?