Search Header Logo

Firewalls and Proxy Servers

Authored by Kyd Tantano Masong

Computers

6th Grade

Used 5+ times

Firewalls and Proxy Servers
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A layer of security to prevent data from being destroyed accidentally or on purpose and to prevent unauthorized access.

Answer explanation

Media Image

Network security refers to a collection of technologies that protect the usability and integrity of a company's infrastructure by preventing the entry or multiplication of a wide variety of potential threats within a network. This is accomplished by preventing the proliferation of a wide range of threats within a network.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Is a word, phrase, or string of characters that is used to draw a distinction between an authorized user or process and an unauthorized user.

Answer explanation

Media Image

Keys are basically like passwords.

3.

DRAG AND DROP QUESTION

1 min • 1 pt

The term "​ (a)   " refers to a type of network security equipment that monitors and filters incoming and outgoing network traffic based on the security rules that an organization has already set.

firewall
password
Proxy Servers
SSL
TLS

Answer explanation

Media Image

Firewalls are basically like security guards.

4.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   is a dedicated computer or software system running on a computer that acts as a middleman between an endpoint device, like a computer, and another server from which a user or client requests a service.

proxy server
Admin
firewall
passwords

Answer explanation

They are like the people who work in the office, where everything is handled.

5.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   is a standard security technology that encrypts the link between a server and a client.

"They are like the lock on your house—you need a key to open it and get inside."

Secure Sockets Layer
Transport Layer Security

Answer explanation

Media Image

SSL, which stands for "secure sockets layer," is an industry-standard security technology that encrypts the connection that exists between a client and a server.

6.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   is a set of rules for sending encrypted data over a network, such as the internet. General use cases include protecting email, VOIP, online transactions, file transfers, and instant messages. This will stop people from listening in on or changing data.

"They're just like the extra locks on your door from the inside. They can help keep people out of your space and keep you safe."

Transport Layer Security
Secure Sockets Layer

7.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   is the process of turning data into a secret code that hides what the data is really about. ​ (b)   is the study of how to encrypt and decrypt information.

Encryption
Cryptography
decode

Answer explanation

Media Image

In a perfect world, only people who are allowed to can turn ciphertext back into plaintext and get to the original information.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?