
Firewalls and Proxy Servers
Authored by Kyd Tantano Masong
Computers
6th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A layer of security to prevent data from being destroyed accidentally or on purpose and to prevent unauthorized access.
Answer explanation
Network security refers to a collection of technologies that protect the usability and integrity of a company's infrastructure by preventing the entry or multiplication of a wide variety of potential threats within a network. This is accomplished by preventing the proliferation of a wide range of threats within a network.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Is a word, phrase, or string of characters that is used to draw a distinction between an authorized user or process and an unauthorized user.
Answer explanation
Keys are basically like passwords.
3.
DRAG AND DROP QUESTION
1 min • 1 pt
The term " (a) " refers to a type of network security equipment that monitors and filters incoming and outgoing network traffic based on the security rules that an organization has already set.
Answer explanation
Firewalls are basically like security guards.
4.
DRAG AND DROP QUESTION
1 min • 1 pt
A (a) is a dedicated computer or software system running on a computer that acts as a middleman between an endpoint device, like a computer, and another server from which a user or client requests a service.
Answer explanation
They are like the people who work in the office, where everything is handled.
5.
DRAG AND DROP QUESTION
1 min • 1 pt
A (a) is a standard security technology that encrypts the link between a server and a client.
"They are like the lock on your house—you need a key to open it and get inside."
Answer explanation
SSL, which stands for "secure sockets layer," is an industry-standard security technology that encrypts the connection that exists between a client and a server.
6.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is a set of rules for sending encrypted data over a network, such as the internet. General use cases include protecting email, VOIP, online transactions, file transfers, and instant messages. This will stop people from listening in on or changing data.
"They're just like the extra locks on your door from the inside. They can help keep people out of your space and keep you safe."
7.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is the process of turning data into a secret code that hides what the data is really about. (b) is the study of how to encrypt and decrypt information.
Answer explanation
In a perfect world, only people who are allowed to can turn ciphertext back into plaintext and get to the original information.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
11 questions
CAPÍTULO 1 NETWORKING ESSENTIALS
Quiz
•
1st - 12th Grade
20 questions
Klaviatuuri kordamine
Quiz
•
6th Grade
14 questions
Formularios de Google
Quiz
•
1st Grade - University
20 questions
Web 2.0
Quiz
•
6th - 10th Grade
15 questions
Layers, IP, MAC Addressing and Packets
Quiz
•
2nd - 9th Grade
15 questions
KS3 Y8 Kodu Quiz
Quiz
•
5th - 8th Grade
13 questions
Five Nights At Freddy's: Security Breach Quiz
Quiz
•
KG - Professional Dev...
12 questions
Creating Webpages
Quiz
•
6th - 8th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade