Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

University

10 Qs

quiz-placeholder

Similar activities

Chapter 4 Revision

Chapter 4 Revision

University

10 Qs

NetworkingSecurity_Lecture1_recap

NetworkingSecurity_Lecture1_recap

University

15 Qs

CHAPTER 4: IDS AND IPS

CHAPTER 4: IDS AND IPS

University

10 Qs

Cybersecurity Final Round

Cybersecurity Final Round

University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

Chapter 14 Controlling and Monitoring Access

Chapter 14 Controlling and Monitoring Access

University

10 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Assessment

Quiz

Computers

University

Easy

Created by

Yusof Intan

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

1. What is the purpose of a password policy?

a) To enforce the use of strong passwords

b) To limit the number of users on a network

c) To control network traffic

d) To encrypt data

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

2. What is the term used for a malicious program that spreads from one computer to another without user intervention?

a) Virus

b) Firewall

c) Encryption

d) Router

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

3. Which of the following is NOT a recommended practice for securing a wireless network?

 a) Enabling encryption (e.g., WPA2)

b) Disabling SSID broadcasting

c) Changing the default administrator password

d) Placing the wireless router in an open and easily accessible location

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

4. What is the purpose of two-factor authentication?

a) To protect against physical threats

b) To control network traffic

c) To encrypt data

d) To add an extra layer of security by requiring two forms of identification

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

5. What is a phishing attack?

  

  

   

a) A physical intrusion into a network

b) An attempt to gain unauthorized access to a network

c) A social engineering technique to trick users into revealing sensitive information

d) A type of malware that replicates itself on a network

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

6. What is the purpose of a VPN (Virtual Private Network)?

a) To protect against physical threats

  

b) To control network traffic

   

c) To encrypt data and provide secure remote access to a private network

d) To store sensitive information

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

7. Which of the following is an example of a strong password?

a) Password123

b) 12345678

   

c) P@ssw0rd!

 

d) MyDog'sName

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?