D4 WorkBook - Quizzez

D4 WorkBook - Quizzez

12th Grade

12 Qs

quiz-placeholder

Similar activities

Technical Terms - Hardware (A-Z) - Base Station

Technical Terms - Hardware (A-Z) - Base Station

12th Grade

10 Qs

Understanding Computer Networks

Understanding Computer Networks

9th Grade - University

12 Qs

OCR A Level CS - 1.3.3 Networks

OCR A Level CS - 1.3.3 Networks

12th Grade

13 Qs

Computer Networks

Computer Networks

11th - 12th Grade

12 Qs

Computer Science

Computer Science

12th Grade

14 Qs

Types Of Networks

Types Of Networks

9th - 12th Grade

8 Qs

16. Network Security Quiz

16. Network Security Quiz

9th - 12th Grade

11 Qs

Networks ICT

Networks ICT

9th - 12th Grade

16 Qs

D4 WorkBook - Quizzez

D4 WorkBook - Quizzez

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Muzhgan Manati

Used 5+ times

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A firewall is a gatekeeper between a(n) ______ and the outside world.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Depending on the level of security one wants for a network, one can block all incoming connections, including those in the list of allowed ____________.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

One of the most common forms of user authentication is a username and --------.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

___________ authentication helps to provide additional security to an account by requiring two or more credentials to be entered when signing in.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Bring-your-own-device (BYOD) mobile devices are most common among --------- businesses that ask their employees to supply their devices to work from or make phone calls.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Whether the company utilizes bring-your-own-device (BYOD) or corporate-managed devices, it must create a strong ------------- policy to protect devices against unauthorized users gaining access to technology or data.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A virus must be attached to a(n) __________ to spread.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?