Search Header Logo

Baldwin University College. Osu Accra. Level 300

Authored by PETER SACKITEY

Computers

University

Used 3+ times

Baldwin University College. Osu Accra.  Level 300
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data encryption?

The process of converting data into a format that cannot be easily understood

The process of compressing data to save storage space

The process of securing data backups

The process of transferring data between different networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a symmetric encryption algorithm?

RSA

AES

Diffie-Hellman

ECC

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall?

To encrypt data during transmission

To prevent unauthorized access to a network

To compress data for efficient storage

To manage and control database transactions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of intrusion detection systems (IDS)?

To prevent unauthorized access to a network

To monitor and detect malicious activities in a network

To encrypt sensitive data during transmission

To back up data in case of a system failure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of two-factor authentication?

Username and password

Fingerprint scan and voice recognition

Security questions and answers

PIN code and access card

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SSL/TLS stand for?

Secure Storage Location/Tracking and Logging Service

Secure Server Language/Transaction Log System

Secure Socket Layer/Transport Layer Security

System Security Library/Task List Scheduler

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a denial-of-service (DoS) attack?

Sending a malicious email attachment

Intercepting network traffic to capture sensitive data

Flooding a server with excessive network requests

Exploiting a vulnerability in a web application

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?