Network Security

Network Security

KG

10 Qs

quiz-placeholder

Similar activities

Animal Behaviour - Review 2

Animal Behaviour - Review 2

12th Grade - University

13 Qs

HOLI🌈

HOLI🌈

5th Grade - University

15 Qs

SPAN 2.0

SPAN 2.0

Professional Development

10 Qs

CHAPTER 1 MIS

CHAPTER 1 MIS

KG

10 Qs

Cyber Security IT Operations

Cyber Security IT Operations

KG

10 Qs

Identifying the Problem and Asking the Questions (PRETEST)

Identifying the Problem and Asking the Questions (PRETEST)

12th Grade

15 Qs

Quiz WP sesi 2

Quiz WP sesi 2

KG - Professional Development

10 Qs

Knowing about Korea

Knowing about Korea

1st - 5th Grade

10 Qs

Network Security

Network Security

Assessment

Quiz

Other

KG

Medium

Created by

Jose Álvarez

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

Authentication

Integrity

Confidentiality

Non-Repudation

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?

SHA-256

AES

SHA-1

MD5

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

An administrator of a small data center wants a flexible, secure method of remotely connecting to servers.Which protocol would be best to use?

Telnet

Secure Shell

Remote Desktop

Secure Copy

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A NIDS/NIPS has identified a threat. Which type of security data will be generated and sent to a logging device?

Transaction

Session

Statical

Alert

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which type of firewall makes use of a proxy server to connect to remote servers on behalf of clients?

Stateful Firewall

VPN

Application Gateway Firewall

NGFW

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which utility uses the Internet Control Messaging Protocol (ICMP)?

PING

ARP

DNS

DHCP

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which device is usually the first line of defense in a layered defense-in-depth approach?

Server

Access Layer Switch

Internal Router

Firewall

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?