Network and Computer Security Quiz

Network and Computer Security Quiz

University

15 Qs

quiz-placeholder

Similar activities

Cyber Hygiene

Cyber Hygiene

University

20 Qs

TRACK_ELECTIVE F_SW1

TRACK_ELECTIVE F_SW1

University

10 Qs

NOCTI: Visual Comm. & Multimedia Design-Cybersecurity

NOCTI: Visual Comm. & Multimedia Design-Cybersecurity

11th Grade - University

20 Qs

Biometrics

Biometrics

University

12 Qs

INTRO Encryption and Decryption Quiz

INTRO Encryption and Decryption Quiz

University

20 Qs

CYBER CONCLAVE- ROUND 2

CYBER CONCLAVE- ROUND 2

University

10 Qs

Cybersecurity 101

Cybersecurity 101

University

10 Qs

Quiz on Privacy and Confidentiality

Quiz on Privacy and Confidentiality

University

10 Qs

Network and Computer Security Quiz

Network and Computer Security Quiz

Assessment

Quiz

Other

University

Easy

Created by

Fatihah Izzati Nizam

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended practice for creating secure passwords?

Change passwords only once a year

Use the same password for all accounts

Use only lowercase letters

Include a combination of uppercase and lowercase letters, numbers, and symbols

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does multi-factor authentication add to security?

It is only used for financial transactions

It eliminates the need for passwords

It requires only a password

It adds an extra layer of security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to secure network connections?

Using plain HTTP

Using encryption such as HTTPS or SSL

Disabling firewalls

Allowing all incoming connections

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of regular software updates?

To add new features only

To prevent known vulnerabilities from being exploited

To slow down the system

To increase the size of the software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of user permissions in network security?

To allow all users access to all data

To limit user access to only what is necessary

To increase the number of users

To make data public

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key component of an incident response plan?

Ignoring the breach

Not informing anyone

Waiting for the next update

Having a plan in place to minimize damage

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A type of malware

A social engineering attack to trick users into sharing sensitive information

A method of securing passwords

A type of firewall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?