
security in IT
Authored by Natalia Estrada
English
University
CCSS covered
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attacks on a computer from the internet.
FIREWALLS
CYBERATTACK
NETWORK PERIMETER
HACKERS
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
People who try to gain illegal access to a computer system.
HACKERS
NETWORK PERIMETER
GATEWAY
CYBERATTACKS
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The network boundary between a private user network and the internet
SECURE SOCKET LAYER
TWO-FACTOR AUTHENTICATION
GATEWAY
NETWORK PERIMETER
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a hardware device that acts as a "gate" between two networks.
HACKERS
GATEWAY
SECURE SOCKET LAYER
FIREWALLS
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a network security software that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules
SECURE SOCKET LAYER
FIREWALLS
NETWORK PERIMETER
HACKERS
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ________ has an Internet connection on one side, and some sort of LAN connection on the other.
GATEWAY
TWO-FACTOR AUTHENTICATION 2FA
SECURE SOCKET LAYER
NETWORK PERIMETER
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To give two independent forms of identification
HACKERS
TWO-FACTOR AUTHENTICATION
SECURE SOCKET LAYER
FIREWALLS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?