Search Header Logo
Y9 Network Security _Firewall,Encryption and Authentication

Y9 Network Security _Firewall,Encryption and Authentication

Assessment

Presentation

Computers

9th Grade

Medium

Created by

Sin Yoon Chong

Used 3+ times

FREE Resource

9 Slides • 23 Questions

1

media

2

Multiple Choice

________________ is the delivery of different services through the Internet. These resources include tools and applications like data storage, servers, databases, networking, and software.

1

Cloud Computing

2

Network Computing

3

Storage Computing

4

None of the choices

3

Multiple Choice

Cloud computing services such as storage and software that __________.

1

Can be accessed on any device

2

Are always free

3

Can be accessed by any device that is connected to a LAN

4

Can be accessed on any device that is connected to the internet

4

Multiple Choice

Cloud Computing provides in allows for cost savings – reduced facility, hardware/software investments, support

1

True

2

False

5

Multiple Choice

Cloud storage can be provided as a service by allowing your data to be stored...

1

remotely on the host company's servers

2

remotely on your local computer

3

locally on your network

4

locally on your remote computer

6

Multiple Choice

Which of these is an advantage of cloud storage?

1

The user has no control over their data

2

Many programs can be run at the same time, regardless of the processing power of your device

3

Accessible anywhere with an internet connection

4

Portability

7

Multiple Choice

An advantage of cloud storage is...

1

It is easy to increase the amount of storage available

2

It is always free to increase the amount of storage available

3

An internet connection is not needed to access your data

4

An internet connection is needed to access your data

8

Multiple Choice

A disadvantage of cloud storage is that..

1

Your data will always be hacked because your data can be accessed from any device with an internet connection

2

Your data is vulnerable to hacking because your data can be accessed from any device with an internet connection

3

Your data can easily be hacked because there is no system security provided by the host

4

Your data is vulnerable to hacking because it is stored locally on your computer

9

Multiple Choice

A disadvantage of cloud computing is...

1

You need an internet connection to access the data or software

2

You need an internet connection to access your LAN

3

You cannot use a device that is connected to the internet

4

You need local storage to manage the data backups

10

​4.2 Network issues and security

Security of Computer Networks

11

media
media
media

12

media
media
media

13

media

14

media

15

media

16

media

17

media

18

Multiple Choice

The process of encoding messages so that it can only be viewed by authorized individuals.

1

firewall

2

encryption

3

authentication

19

Multiple Choice

Question image
1

firewall

2

encryption

3

authentication

20

Multiple Choice

It establishes a border between an external network and the network it guards.

1

firewall

2

encryption

3

authentication

21

Multiple Choice

Question image
1

firewall

2

encryption

3

authentication

22

Multiple Choice

It is used by a server when the server needs to know exactly who is accessing their information or site.

1

firewall

2

encryption

3

authentication

23

Multiple Choice

It secures digital data by encoding it mathematically through cryptography so that it can only be read, or decrypted, by those with the correct key or password.

1

firewall

2

encryption

3

authentication

24

Multiple Choice

Question image
1

firewall

2

encryption

3

authentication

25

Multiple Choice

This is software or firmware that prevents unauthorized access to a network. It inspects incoming and outgoing traffic using a set of rules to identify and block threats. 

1

firewall

2

encryption

3

authentication

26

Multiple Choice

It enables access control by proving that a user’s credentials match those in an authorized user’s database. I

1

firewall

2

encryption

3

authentication

27

Multiple Choice

What does Firewall Do?
1
Prevents Hackers
2
Install Viruses
3
Give you SD cards
4
Blocks all content

28

Multiple Choice

Firewalls can be configured to block data from certain locations (i.e., computer network addresses), applications, or ports while allowing relevant and necessary data through

1

True

2

False

29

Multiple Choice

Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary network traffic

1

True

2

False

30

Multiple Choice

What do you call the process in which a user is identified via a username and password?

1
authentication
2
authorization
3
accounting
4
auditing

31

Multiple Select

What advice would you give on choosing a secure password?

1

Use the same password for everything

2

Longer passwords are best

3

Use different kinds of characters

4

Write your passwords in a notebook

32

Multiple Select

What would make a password STRONGER? Check ALL that apply:

1

Using special characters, like # * & @

2

Using my pet's birthday

3

Using my BFF's name

4

Making it longer

media

Show answer

Auto Play

Slide 1 / 32

SLIDE