Computer Network Security I Review

Computer Network Security I Review

9th - 12th Grade

37 Qs

quiz-placeholder

Similar activities

End of rotation - Cryptography and Networks

End of rotation - Cryptography and Networks

8th - 9th Grade

41 Qs

MYOB Asyiik

MYOB Asyiik

11th Grade

40 Qs

TJBL  (JARINGAN BERBASIS LUAS)

TJBL (JARINGAN BERBASIS LUAS)

11th Grade

40 Qs

INF Fase E Asessmen Sumatif Akhir

INF Fase E Asessmen Sumatif Akhir

10th Grade

40 Qs

Sumatif Tengah Sem2  Informatika 11F

Sumatif Tengah Sem2 Informatika 11F

11th Grade

40 Qs

Photoshop Terms and Controls

Photoshop Terms and Controls

9th Grade - University

38 Qs

All About Computers

All About Computers

9th - 12th Grade

40 Qs

UTS1 XII TKJ B Teknologi Layanan Jaringan

UTS1 XII TKJ B Teknologi Layanan Jaringan

12th Grade

40 Qs

Computer Network Security I Review

Computer Network Security I Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Lavenia Anderson

Used 19+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The way a Business or Organization protects your Network and data from breaches, intrusions, and other threats.

Network Security

Access Controls

Application Security

Network Analytics

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

All are benefits of Network Security, except one.

Protecting Client Data and Information

Keep shared data secure

Ensure reliable access

Looking at Social Media accounts

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A Network Security device that monitors and filters incoming and outgoing Network traffic based on an Organization's previously established security rules to accept, reject, and drop data.

Firewalls

Network Segmentation

Access Controls

Remote Access - Virtual Private Network (VPN)

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Network Administrators determine the people, groups, and devices that have access to the Organization's network, applications, and computer systems.

Firewalls

Access Controls

Network Segmentation

Remote Access VPN

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A Network Security technique that divides a Network into smaller distinct Sub-network with each functioning as a smaller, individual network like Organizational Assets, Employee permissions, or non-permissions, and etc.

Remote Access VPN

Firewalls

Network Segmentation

Zero-Trust

Network Access

(ZTNA)

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This Network Security tool provides remote and secure access to an Organization's Network by employees, individual hosts, clients as well as telecommuters, mobile users, and extranet customers.

Firewalls

Zero-Trust Network Access (ZTNA)

Network Segmentation

Remote Access VPN

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A Model known as "Software-Defined Perimeter (SDP)" that is used by Network Administrators to grant access and permission rights according to the roles, tasks, and responsibilities of the User to an Organization's Network.

Zero-Trust Network Access (ZTNA)

Firewalls

Network Segmentation

Remote Access VPN

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?