Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

quiz-placeholder

Similar activities

Chapter 3 (fundamentals of Security)

Chapter 3 (fundamentals of Security)

University

10 Qs

IAS101 - Week 8

IAS101 - Week 8

University

15 Qs

Week #7 - Risk Management

Week #7 - Risk Management

University

12 Qs

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

University

10 Qs

Chapter 14 Controlling and Monitoring Access

Chapter 14 Controlling and Monitoring Access

University

10 Qs

Cyberecurity Ess 2

Cyberecurity Ess 2

University

12 Qs

Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

9th Grade - University

9 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

Assessment

Quiz

Computers

University

Medium

Created by

farizatul akmar

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 3 pts

Which of the following are the THREE (3) importance of computer and network security?

To protect company assets

To keep your accessibility

To gain a competitive advantage

To keep you job

2.

OPEN ENDED QUESTION

3 mins • 3 pts

The three legs of the "security trinity" are:

1. ________

2. ________

3. ________

Evaluate responses using AI:

OFF

3.

MULTIPLE SELECT QUESTION

1 min • 4 pts

What are the FOUR (4) core principles of Information Security?

Integrity

Prevention

Confidentiality

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The following are the risks assessment process of evaluating potential risks EXCEPT ...

Identifying and prioritizing assets

Identifying threats and their probabilities

Developing a cost benefit analysis

Identifying accessibility

Identifying countermeasure

5.

OPEN ENDED QUESTION

1 min • 1 pt

____________ is an effort to obtain illegal admission to your organization’s network, to take your data without your knowledge, or execute other malicious pursuits

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ refers to malicious hackers gain unauthorized access to a computer system or network. They also make amendments to the data, either by encrypting, removing, or compromising it.

Active Attack

Passive Attack

Vulnerabilities

Threats

7.

MULTIPLE SELECT QUESTION

1 min • 4 pts

What are the FOUR (4) major categories of Network Security Threats?

Structured Threats

Externals Threats

Cumulative Threats

Unstructured Threats

Internal Threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?