Firewalls and Proxy Servers

Quiz
•
Computers
•
6th Grade
•
Medium
Kyd Tantano Masong
Used 5+ times
FREE Resource
16 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A layer of security to prevent data from being destroyed accidentally or on purpose and to prevent unauthorized access.
Answer explanation
Network security refers to a collection of technologies that protect the usability and integrity of a company's infrastructure by preventing the entry or multiplication of a wide variety of potential threats within a network. This is accomplished by preventing the proliferation of a wide range of threats within a network.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Is a word, phrase, or string of characters that is used to draw a distinction between an authorized user or process and an unauthorized user.
Answer explanation
Keys are basically like passwords.
3.
DRAG AND DROP QUESTION
1 min • 1 pt
The term " (a) " refers to a type of network security equipment that monitors and filters incoming and outgoing network traffic based on the security rules that an organization has already set.
Answer explanation
Firewalls are basically like security guards.
4.
DRAG AND DROP QUESTION
1 min • 1 pt
A (a) is a dedicated computer or software system running on a computer that acts as a middleman between an endpoint device, like a computer, and another server from which a user or client requests a service.
Answer explanation
They are like the people who work in the office, where everything is handled.
5.
DRAG AND DROP QUESTION
1 min • 1 pt
A (a) is a standard security technology that encrypts the link between a server and a client.
"They are like the lock on your house—you need a key to open it and get inside."
Answer explanation
SSL, which stands for "secure sockets layer," is an industry-standard security technology that encrypts the connection that exists between a client and a server.
6.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is a set of rules for sending encrypted data over a network, such as the internet. General use cases include protecting email, VOIP, online transactions, file transfers, and instant messages. This will stop people from listening in on or changing data.
"They're just like the extra locks on your door from the inside. They can help keep people out of your space and keep you safe."
7.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is the process of turning data into a secret code that hides what the data is really about. (b) is the study of how to encrypt and decrypt information.
Answer explanation
In a perfect world, only people who are allowed to can turn ciphertext back into plaintext and get to the original information.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Cryptography Basics

Quiz
•
6th - 8th Grade
14 questions
cyber security

Quiz
•
KG - Professional Dev...
15 questions
IC3 GS6 Level 1 Domain 2 Lesson 1

Quiz
•
6th Grade - University
20 questions
How the Internet Works

Quiz
•
6th - 8th Grade
20 questions
Computer Basics

Quiz
•
6th - 8th Grade
15 questions
Understanding Wireless Data Transfer

Quiz
•
6th Grade
21 questions
ICT 4 - Networks

Quiz
•
6th - 9th Grade
20 questions
Grade 6 -Review On-Unit 3

Quiz
•
6th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Appointment Passes Review

Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
Grammar Review

Quiz
•
6th - 9th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
8 questions
Time Management

Quiz
•
6th Grade
18 questions
Company Logos

Quiz
•
6th - 8th Grade
15 questions
Acceptable Use Policy (Quiz)

Quiz
•
6th - 8th Grade
25 questions
Career Vs. Job

Quiz
•
6th - 8th Grade
10 questions
Networking Devices and Their Functions

Interactive video
•
5th - 8th Grade
20 questions
Binary Numbers Quiz

Quiz
•
6th - 8th Grade