Firewalls and Proxy Servers

Firewalls and Proxy Servers

6th Grade

16 Qs

quiz-placeholder

Similar activities

network security

network security

6th - 8th Grade

14 Qs

Cl VI-A Quiz #2

Cl VI-A Quiz #2

6th Grade

20 Qs

Advanced CyberCamp Day 1 & 2 Review

Advanced CyberCamp Day 1 & 2 Review

KG - Professional Development

20 Qs

Networking and Operating Systems

Networking and Operating Systems

6th - 8th Grade

20 Qs

Preliminary round

Preliminary round

6th - 8th Grade

20 Qs

Cyber Security

Cyber Security

6th Grade

14 Qs

Year 9 - Cybersecurity

Year 9 - Cybersecurity

6th - 8th Grade

15 Qs

W5 S6

W5 S6

6th Grade

20 Qs

Firewalls and Proxy Servers

Firewalls and Proxy Servers

Assessment

Quiz

Computers

6th Grade

Medium

Created by

Kyd Tantano Masong

Used 5+ times

FREE Resource

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A layer of security to prevent data from being destroyed accidentally or on purpose and to prevent unauthorized access.

Answer explanation

Media Image

Network security refers to a collection of technologies that protect the usability and integrity of a company's infrastructure by preventing the entry or multiplication of a wide variety of potential threats within a network. This is accomplished by preventing the proliferation of a wide range of threats within a network.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Is a word, phrase, or string of characters that is used to draw a distinction between an authorized user or process and an unauthorized user.

Answer explanation

Media Image

Keys are basically like passwords.

3.

DRAG AND DROP QUESTION

1 min • 1 pt

The term "​ (a)   " refers to a type of network security equipment that monitors and filters incoming and outgoing network traffic based on the security rules that an organization has already set.

firewall
password
Proxy Servers
SSL
TLS

Answer explanation

Media Image

Firewalls are basically like security guards.

4.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   is a dedicated computer or software system running on a computer that acts as a middleman between an endpoint device, like a computer, and another server from which a user or client requests a service.

proxy server
Admin
firewall
passwords

Answer explanation

They are like the people who work in the office, where everything is handled.

5.

DRAG AND DROP QUESTION

1 min • 1 pt

A ​ (a)   is a standard security technology that encrypts the link between a server and a client.

"They are like the lock on your house—you need a key to open it and get inside."

Secure Sockets Layer
Transport Layer Security

Answer explanation

Media Image

SSL, which stands for "secure sockets layer," is an industry-standard security technology that encrypts the connection that exists between a client and a server.

6.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   is a set of rules for sending encrypted data over a network, such as the internet. General use cases include protecting email, VOIP, online transactions, file transfers, and instant messages. This will stop people from listening in on or changing data.

"They're just like the extra locks on your door from the inside. They can help keep people out of your space and keep you safe."

Transport Layer Security
Secure Sockets Layer

7.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   is the process of turning data into a secret code that hides what the data is really about. ​ (b)   is the study of how to encrypt and decrypt information.

Encryption
Cryptography
decode

Answer explanation

Media Image

In a perfect world, only people who are allowed to can turn ciphertext back into plaintext and get to the original information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?