
Network Security Quiz
Authored by Dalia Pulido
Instructional Technology
9th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company transmits sensitive customer information across its network. Which of the following technologies should it use to protect data in motion?
AES encryption
TLS or IPsec
Full disk encryption
Access control lists
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following methods would best protect a database stored on a server from unauthorized access?
Encrypting the database with AES
Using a firewall to block unauthorized users
Implementing a VPN for remote access
Using TLS encryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which entity is responsible for digitally signing and issuing certificates to verify the authenticity of websites and users?
Firewall
Certificate Authority (CA)
Intrusion Prevention System (IPS)
File Integrity Checker
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company assigns employees to specific job roles and grants access permissions accordingly. This is an example of:
Mandatory Access Control (MAC)
Multi-Factor Authentication (MFA)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the Principle of Least Privilege (PoLP)?
Users should have administrator access to all systems
Users should be granted only the minimum permissions necessary to perform their job functions
All users must be assigned to a single security group
Users should have full access to their department's data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure that employees can only access their work applications while connected to the corporate VPN. Which method would enforce this?
Digital Certificate Signing
Network Access Control (NAC)
File Integrity Monitoring
Role-Based Access Control
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the security strategy for SCADA networks?
Complete isolation from external networks
Full integration with public internet
Allowing remote access for all employees
Using strong passwords only
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
50 questions
Komponen Pasif dan Aktif Elektronika
Quiz
•
10th - 11th Grade
40 questions
UTS TDO TBSM
Quiz
•
12th Grade
45 questions
LATIHAN SOAL TIK KELAS IX
Quiz
•
9th Grade
40 questions
ELECTRÓNICA ANALÓGICA
Quiz
•
University
50 questions
EMPOWERMENT TECHNOLOGIES - REVIEW QUIZ - 4th Quarter
Quiz
•
11th Grade
40 questions
SISTEM KOPLING SEPEDA MOTOR
Quiz
•
12th Grade
40 questions
Ôn tập HKI NH: 2023-2024
Quiz
•
9th Grade
45 questions
Internet y redes
Quiz
•
6th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade