Network Security

Network Security

KG

10 Qs

quiz-placeholder

Similar activities

ITGS: 1.09 Policies and 1.10 Standards and Protocols

ITGS: 1.09 Policies and 1.10 Standards and Protocols

9th - 10th Grade

12 Qs

Module 6: Securing Cloud Resources

Module 6: Securing Cloud Resources

9th - 12th Grade

10 Qs

Copyright

Copyright

9th - 12th Grade

12 Qs

Computer Virus

Computer Virus

7th Grade

10 Qs

Bronx Rappers #2023

Bronx Rappers #2023

5th Grade

10 Qs

GCSE Computer Science - System Security

GCSE Computer Science - System Security

9th - 11th Grade

15 Qs

Firewall Jaringan Komputer

Firewall Jaringan Komputer

12th Grade

10 Qs

Cybersecurity 101

Cybersecurity 101

University

10 Qs

Network Security

Network Security

Assessment

Quiz

Other

KG

Medium

Created by

Jose Álvarez

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

Authentication

Integrity

Confidentiality

Non-Repudation

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?

SHA-256

AES

SHA-1

MD5

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

An administrator of a small data center wants a flexible, secure method of remotely connecting to servers.Which protocol would be best to use?

Telnet

Secure Shell

Remote Desktop

Secure Copy

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A NIDS/NIPS has identified a threat. Which type of security data will be generated and sent to a logging device?

Transaction

Session

Statical

Alert

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which type of firewall makes use of a proxy server to connect to remote servers on behalf of clients?

Stateful Firewall

VPN

Application Gateway Firewall

NGFW

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which utility uses the Internet Control Messaging Protocol (ICMP)?

PING

ARP

DNS

DHCP

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which device is usually the first line of defense in a layered defense-in-depth approach?

Server

Access Layer Switch

Internal Router

Firewall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?