security in IT

security in IT

University

12 Qs

quiz-placeholder

Similar activities

ECOM-U3

ECOM-U3

University

16 Qs

Deep Learning Fundamentals

Deep Learning Fundamentals

University

15 Qs

TKJ

TKJ

12th Grade - University

15 Qs

Network Quiz

Network Quiz

12th Grade - University

15 Qs

FCE Vocabulary review

FCE Vocabulary review

11th Grade - University

15 Qs

Understanding Data Transmission

Understanding Data Transmission

3rd Grade - University

10 Qs

DCCN QUIZ

DCCN QUIZ

University

15 Qs

Quiz on Physical Keyloggers and Online Safety

Quiz on Physical Keyloggers and Online Safety

University

8 Qs

security in IT

security in IT

Assessment

Quiz

English

University

Medium

CCSS
RI.9-10.4, RI.11-12.8, RI.11-12.4

+6

Standards-aligned

Created by

Natalia Estrada

Used 21+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacks on a computer from the internet.

FIREWALLS

CYBERATTACK

NETWORK PERIMETER

HACKERS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

People who try to gain illegal access to a computer system.

HACKERS

NETWORK PERIMETER

GATEWAY

CYBERATTACKS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The network boundary between a private user network and the internet

SECURE SOCKET LAYER

TWO-FACTOR AUTHENTICATION

GATEWAY

NETWORK PERIMETER

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a hardware device that acts as a "gate" between two networks.

HACKERS

GATEWAY

SECURE SOCKET LAYER

FIREWALLS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a network security software that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules

SECURE SOCKET LAYER

FIREWALLS

NETWORK PERIMETER

HACKERS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ________ has an Internet connection on one side, and some sort of LAN connection on the other.

GATEWAY

TWO-FACTOR AUTHENTICATION 2FA

SECURE SOCKET LAYER

NETWORK PERIMETER

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To give two independent forms of identification

HACKERS

TWO-FACTOR AUTHENTICATION

SECURE SOCKET LAYER

FIREWALLS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?