Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

quiz-placeholder

Similar activities

Threat Modeling Concepts and Process Quiz BSIT 4A

Threat Modeling Concepts and Process Quiz BSIT 4A

University

15 Qs

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

University

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Risk Management

Risk Management

University

9 Qs

Initial Assessment - CompTIA IT fundamentals

Initial Assessment - CompTIA IT fundamentals

University

10 Qs

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

9th Grade - University

9 Qs

Network Security Fundamentals

Network Security Fundamentals

University

8 Qs

Principles of IT Vocabulary A-J

Principles of IT Vocabulary A-J

7th Grade - University

10 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

Assessment

Quiz

Computers

University

Medium

Created by

farizatul akmar

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 3 pts

Which of the following are the THREE (3) importance of computer and network security?

To protect company assets

To keep your accessibility

To gain a competitive advantage

To keep you job

2.

OPEN ENDED QUESTION

3 mins • 3 pts

The three legs of the "security trinity" are:

1. ________

2. ________

3. ________

Evaluate responses using AI:

OFF

3.

MULTIPLE SELECT QUESTION

1 min • 4 pts

What are the FOUR (4) core principles of Information Security?

Integrity

Prevention

Confidentiality

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The following are the risks assessment process of evaluating potential risks EXCEPT ...

Identifying and prioritizing assets

Identifying threats and their probabilities

Developing a cost benefit analysis

Identifying accessibility

Identifying countermeasure

5.

OPEN ENDED QUESTION

1 min • 1 pt

____________ is an effort to obtain illegal admission to your organization’s network, to take your data without your knowledge, or execute other malicious pursuits

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ refers to malicious hackers gain unauthorized access to a computer system or network. They also make amendments to the data, either by encrypting, removing, or compromising it.

Active Attack

Passive Attack

Vulnerabilities

Threats

7.

MULTIPLE SELECT QUESTION

1 min • 4 pts

What are the FOUR (4) major categories of Network Security Threats?

Structured Threats

Externals Threats

Cumulative Threats

Unstructured Threats

Internal Threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?