
ITS Network Security pt2
Authored by Ryan Starling
Computers
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a method for protecting the client and server from security threats known as?
Firewall configuration
Network bandwidth optimization
Reducing the attack surface
Data backup management
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication method requires users to provide two or more forms of verification before granting access?
Biometric authentication
Token-based authentication
Multifactor authentication
Single sign-on
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is used to control access to files and folders in Windows?
Data loss prevention
Intrusion detection systems
Network access control
Access control lists
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of recording events in an information system to provide a record of user activities?
Intrusion prevention
Packet filtering
Monitoring
Logging
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of converting information into a code to prevent unauthorized access?
Decryption
Encoding
Obfuscation
Cryptography
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which encryption method is used to protect data stored on a computer's hard drive?
Public key encryption
AES encryption
SSL/TLS encryption
Bitlocker
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a virtual private network (VPN) encryption?
To secure social media accounts
To protect data at rest
To encrypt network traffic
To secure email communication
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?