Baldwin University College. Osu Accra.  Level 300

Baldwin University College. Osu Accra. Level 300

University

60 Qs

quiz-placeholder

Similar activities

402FICT

402FICT

University

60 Qs

ITSE201

ITSE201

12th Grade - University

64 Qs

R081 Work plan, pre production, research, hardware and leg

R081 Work plan, pre production, research, hardware and leg

KG - University

55 Qs

video games

video games

KG - Professional Development

63 Qs

ITC101L - A Quiz 1

ITC101L - A Quiz 1

University

60 Qs

Computer Mixed Quiz-3

Computer Mixed Quiz-3

1st Grade - University

60 Qs

Network Security - Practice Test #1

Network Security - Practice Test #1

10th Grade - University

62 Qs

UAS APLIKOM 2025 (08.00)

UAS APLIKOM 2025 (08.00)

University

65 Qs

Baldwin University College. Osu Accra.  Level 300

Baldwin University College. Osu Accra. Level 300

Assessment

Quiz

Computers

University

Hard

Created by

PETER SACKITEY

Used 3+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data encryption?

The process of converting data into a format that cannot be easily understood

The process of compressing data to save storage space

The process of securing data backups

The process of transferring data between different networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a symmetric encryption algorithm?

RSA

AES

Diffie-Hellman

ECC

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall?

To encrypt data during transmission

To prevent unauthorized access to a network

To compress data for efficient storage

To manage and control database transactions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of intrusion detection systems (IDS)?

To prevent unauthorized access to a network

To monitor and detect malicious activities in a network

To encrypt sensitive data during transmission

To back up data in case of a system failure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of two-factor authentication?

Username and password

Fingerprint scan and voice recognition

Security questions and answers

PIN code and access card

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SSL/TLS stand for?

Secure Storage Location/Tracking and Logging Service

Secure Server Language/Transaction Log System

Secure Socket Layer/Transport Layer Security

System Security Library/Task List Scheduler

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a denial-of-service (DoS) attack?

Sending a malicious email attachment

Intercepting network traffic to capture sensitive data

Flooding a server with excessive network requests

Exploiting a vulnerability in a web application

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?