FINAL EXAM INTRODUCTION TO SECURITY

FINAL EXAM INTRODUCTION TO SECURITY

11th Grade

30 Qs

quiz-placeholder

Similar activities

B1. Hệ điều hành

B1. Hệ điều hành

11th Grade

28 Qs

Operating system

Operating system

7th Grade - University

25 Qs

UJIAN MID SEMESTER 1 X ALL MAPEL SIMULASI DAN KOMUNIKASI DIGITAL

UJIAN MID SEMESTER 1 X ALL MAPEL SIMULASI DAN KOMUNIKASI DIGITAL

10th Grade - University

25 Qs

Color

Color

9th - 12th Grade

27 Qs

BTEC Creative Digital Media - Unit 01 - Test 02

BTEC Creative Digital Media - Unit 01 - Test 02

10th - 11th Grade

25 Qs

Credit Cards/Reports

Credit Cards/Reports

11th - 12th Grade

28 Qs

Computer Spec - 10X4

Computer Spec - 10X4

9th - 11th Grade

25 Qs

Input Devices

Input Devices

11th Grade

25 Qs

FINAL EXAM INTRODUCTION TO SECURITY

FINAL EXAM INTRODUCTION TO SECURITY

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Alaqsha Gilang

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following firewalls hides or masquerades the private addresses of network hosts?

  • Reverse proxy firewall

Network Address Translation Firewall

  • Proxy server

  • Network layer firewall

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?

  • Scalability

  • Availability

Confidentiality

  • Integrity

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

  • Scalability

  • Integrity

  • Confidentiality

Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?

  • Weaknesses in security practices

  • Race conditions

Access control problems

  • Buffer overflow

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best way to avoid getting spyware on a machine?

  • Install the latest antivirus updates

  • Install the latest web browser updates

Install software only from trusted websites

Install the latest operating system updates

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?

That the Bluetooth adapter is disabled

If the laptop requires user authentication for file and media sharing

That the laptop web browser is operating in private mode

If the laptop has a master password set to secure the passwords stored in the password manager

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?

  • Application layer firewall

  • Transport layer firewall

Reverse proxy server

 Network layer firewall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?