Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

University

10 Qs

quiz-placeholder

Similar activities

Computer Networking Quiz

Computer Networking Quiz

11th Grade - University

15 Qs

OSI Model

OSI Model

University

15 Qs

Network Administration Quiz 5

Network Administration Quiz 5

University

15 Qs

Let's Encrypt

Let's Encrypt

University

15 Qs

PHP (Hypertext Preprocessor)

PHP (Hypertext Preprocessor)

University

12 Qs

Module 11 (Fundamentals of Cybersecurity)

Module 11 (Fundamentals of Cybersecurity)

University

10 Qs

1.3 Internet (IP, URL, DNS)

1.3 Internet (IP, URL, DNS)

9th Grade - University

10 Qs

DTN 3023: Application Layer

DTN 3023: Application Layer

12th Grade - University

14 Qs

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Assessment

Quiz

Computers

University

Easy

Created by

Intan Yusof

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

1. What is the purpose of a password policy?

a) To enforce the use of strong passwords

b) To limit the number of users on a network

c) To control network traffic

d) To encrypt data

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

2. What is the term used for a malicious program that spreads from one computer to another without user intervention?

a) Virus

b) Firewall

c) Encryption

d) Router

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

3. Which of the following is NOT a recommended practice for securing a wireless network?

 a) Enabling encryption (e.g., WPA2)

b) Disabling SSID broadcasting

c) Changing the default administrator password

d) Placing the wireless router in an open and easily accessible location

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

4. What is the purpose of two-factor authentication?

a) To protect against physical threats

b) To control network traffic

c) To encrypt data

d) To add an extra layer of security by requiring two forms of identification

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

5. What is a phishing attack?

  

  

   

a) A physical intrusion into a network

b) An attempt to gain unauthorized access to a network

c) A social engineering technique to trick users into revealing sensitive information

d) A type of malware that replicates itself on a network

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

6. What is the purpose of a VPN (Virtual Private Network)?

a) To protect against physical threats

  

b) To control network traffic

   

c) To encrypt data and provide secure remote access to a private network

d) To store sensitive information

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

7. Which of the following is an example of a strong password?

a) Password123

b) 12345678

   

c) P@ssw0rd!

 

d) MyDog'sName

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?