esafas

esafas

University

9 Qs

quiz-placeholder

Similar activities

CONTINUA CALIDAD

CONTINUA CALIDAD

University - Professional Development

10 Qs

Preguntas de Estructura Organizacional

Preguntas de Estructura Organizacional

University

13 Qs

EXAMEN DIAGNOSTICO AGRONEGOCIOS Y AGROEXPORTACION

EXAMEN DIAGNOSTICO AGRONEGOCIOS Y AGROEXPORTACION

University

10 Qs

Quizizz HICT 2023 UiTM Perlis 3

Quizizz HICT 2023 UiTM Perlis 3

University

10 Qs

Casal de Joves

Casal de Joves

7th Grade - University

7 Qs

Estructura del Sistema Financiero Dominicano

Estructura del Sistema Financiero Dominicano

University

10 Qs

Week-2 (Day-2)

Week-2 (Day-2)

University

10 Qs

MODULO 4 PARTE 1

MODULO 4 PARTE 1

University

10 Qs

esafas

esafas

Assessment

Quiz

Other

University

Practice Problem

Easy

Created by

johnrich clemente

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Deals with the fundamental human rights of a person’s privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.

Internet Privacy

Network Security

Network Technologies

Different Techniques to Protect Internet Privacy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It ensures the integrity, confidentiality, and accessibility of computer networks. It is relevant when cybercriminals are becoming more dominant in exploiting new users and enterprises, then it is vital to take extra precautions to avoid any data breach.

Network Security

Network Technologies

Internet Privacy

Data Privacy

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It was previously stated that it monitors and filters incoming and outgoing network traffic.

Firewall

Intrusion Detection System (IDS)

Wi-Fi Protected Access 3 (WPA3)

Virtual Private Network (VPN)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a software or a device for closely monitoring a network for any malicious activity or intrusion at the network or the host.

Intrusion Detection System (IDS)

Firewall

Virtual Private Network (VPN)

Email Security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the latest wireless network security certificate protocol by the Wi- Fi alliance. It focuses its filtering at the “entry” when a new device requests to connect to the network.

Wi-Fi Protected Access 3 (WPA3)

Virtual Private Network (VPN)

Intrusion Detection System (IDS)

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It connects any remote device to an enterprise server wherein company data is hosted. 1It piggybacks on a public network to directly access the server, ensuring that the users' online activities are publicly hidden

Intrusion Detection System (IDS)

Wi-Fi Protected Access 3 (WPA3)

Virtual Private Network (VPN)

Email Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As emails allow scripts to be embedded inside the device, it is easier for anyone to write a code, attach it to an email, then send it. Receivers tend to click this email which can comprise the device.

Email Security

Double-checking Unfamiliar Links

Using Multi-factor Authentication

Virtual Private Network (VPN)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?