security in IT

security in IT

University

12 Qs

quiz-placeholder

Similar activities

computer quiz

computer quiz

9th Grade - University

10 Qs

English and computers

English and computers

University

13 Qs

Network Quiz

Network Quiz

12th Grade - University

15 Qs

FCE Vocabulary review

FCE Vocabulary review

11th Grade - University

15 Qs

Quiz  English (conversation) IF before UAS

Quiz English (conversation) IF before UAS

University

8 Qs

Quiz on the Internet

Quiz on the Internet

12th Grade - University

15 Qs

Set 1 Foundations - Cybersecurity Quiz

Set 1 Foundations - Cybersecurity Quiz

University

17 Qs

DCCN QUIZ

DCCN QUIZ

University

15 Qs

security in IT

security in IT

Assessment

Quiz

English

University

Medium

Created by

Natalia Estrada

Used 21+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacks on a computer from the internet.

FIREWALLS

CYBERATTACK

NETWORK PERIMETER

HACKERS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who try to gain illegal access to a computer system.

HACKERS

NETWORK PERIMETER

GATEWAY

CYBERATTACKS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The network boundary between a private user network and the internet

SECURE SOCKET LAYER

TWO-FACTOR AUTHENTICATION

GATEWAY

NETWORK PERIMETER

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a hardware device that acts as a "gate" between two networks.

HACKERS

GATEWAY

SECURE SOCKET LAYER

FIREWALLS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a network security software that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules

SECURE SOCKET LAYER

FIREWALLS

NETWORK PERIMETER

HACKERS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ________ has an Internet connection on one side, and some sort of LAN connection on the other.

GATEWAY

TWO-FACTOR AUTHENTICATION 2FA

SECURE SOCKET LAYER

NETWORK PERIMETER

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To give two independent forms of identification

HACKERS

TWO-FACTOR AUTHENTICATION

SECURE SOCKET LAYER

FIREWALLS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?