Exam CNSA

Exam CNSA

University

35 Qs

quiz-placeholder

Similar activities

Soal Ulangan Harian Kecerdasan Artifisial

Soal Ulangan Harian Kecerdasan Artifisial

10th Grade - University

30 Qs

Quiz Pengetahuan Umum TIK

Quiz Pengetahuan Umum TIK

9th Grade - University

39 Qs

Aspek Ekonomi Produk Informatika

Aspek Ekonomi Produk Informatika

10th Grade - University

30 Qs

Latihan Soal Materi Informatika kelas 8 smt 1

Latihan Soal Materi Informatika kelas 8 smt 1

8th Grade - University

40 Qs

Tin học

Tin học

12th Grade - University

35 Qs

ITEC101 Quiz on HCI

ITEC101 Quiz on HCI

University

30 Qs

EcoQuest

EcoQuest

University

30 Qs

Ice Breaking

Ice Breaking

4th Grade - University

36 Qs

Exam CNSA

Exam CNSA

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

widi jaelani

Used 1+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which is the most important reason for the removal of unused, unnecessary, or unneeded protocols, services, and applications?

Increased security

Increased performance

Less need for administration

Less machine resource use

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Why is network security important for organizations?

It increases network speed

It protects sensitive information

It reduces electricity usage

It simplifies network configurations

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following best describes 'encryption'?

Speeding up data transmission

Compressing data for storage

Creating user-friendly software

Converting data into a secure code

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The act of attempting to appear to be someone you're not in order to gain access to a system is known as which of the following?

Spoofing

DDoS

Replay

Sniffing

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which term refers to the protection of networked systems from misuse or unauthorized access?

Network Optimization

Network Monitoring

Network Security

Network Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is an example of a social engineering attack?

Firewall breach

Phishing

SQL Injection

Man-in-the-Middle attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is considered an attack vector?

USB drive

Monitor

Keyboard

Printer

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?