Security 101 - 2nd Week

Security 101 - 2nd Week

Professional Development

10 Qs

quiz-placeholder

Similar activities

IT Fundamentals

IT Fundamentals

Professional Development

10 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Number System

Number System

Professional Development

10 Qs

Code Blaze - Round -1

Code Blaze - Round -1

University - Professional Development

10 Qs

PRACTICE  SET FOR INTERMEDIATE 2

PRACTICE SET FOR INTERMEDIATE 2

Professional Development

10 Qs

Snapdragon Academy

Snapdragon Academy

Professional Development

10 Qs

Five Nights At Freddy's: Security Breach Quiz

Five Nights At Freddy's: Security Breach Quiz

KG - Professional Development

13 Qs

JAVA - Arrays

JAVA - Arrays

University - Professional Development

15 Qs

Security 101 - 2nd Week

Security 101 - 2nd Week

Assessment

Quiz

Computers

Professional Development

Practice Problem

Easy

Created by

A Moreno

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which best describes a router?

A device that connects to other devices

A service that utilizes a specific protocol

A device that connects you to other networks

A service that uses the OSI model

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a switch do?

Uses Client / Server mode of communication

Connects you to devices within a WAN

Alternates Network Currents

Connects you to devices within a LAN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which of these are not an endpoint?

Laptop

Printer

Cell Phone

Power Outlet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these services secure shell?

443

22

25

80

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is network encapsulation?

The method of wrapping the entire network infrastructure in a protective layer to prevent unauthorized access.

The process of adding protocol headers and trailers to data packets as they traverse different network layers.

The process of compressing network traffic to reduce bandwidth consumption.

The technique used to encrypt data transmitted over a network to ensure confidentiality.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these ports provide TLS over HTTP?

8080

443

25

53

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the behavior of a stateful firewall?

Monitors incoming traffic

Performs ongoing monitoring of active connects

Prohibits unwanted traffic

Performs IP, Port analysis

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?