FINAL EXAM INTRODUCTION TO SECURITY

FINAL EXAM INTRODUCTION TO SECURITY

11th Grade

30 Qs

quiz-placeholder

Similar activities

4QICT12 - Current and Future Trends of Media and Information

4QICT12 - Current and Future Trends of Media and Information

11th - 12th Grade

28 Qs

CompTIA 220-902 Practice PM TEC

CompTIA 220-902 Practice PM TEC

11th - 12th Grade

26 Qs

TRẮC NGHIỆM TIN 4 BÀI 2: GÕ PHÍM ĐÚNG CÁCH

TRẮC NGHIỆM TIN 4 BÀI 2: GÕ PHÍM ĐÚNG CÁCH

5th Grade - University

25 Qs

Parts of Computer

Parts of Computer

11th Grade

25 Qs

Inside Google Quiz

Inside Google Quiz

9th - 12th Grade

25 Qs

LATIHAN PENGENALAN KOMPUTER

LATIHAN PENGENALAN KOMPUTER

10th Grade - University

25 Qs

Penilaian Sumatif Genap 2023-2024

Penilaian Sumatif Genap 2023-2024

11th Grade

25 Qs

PTS GENAP - WAN - XI TJKT TP 2023/2024

PTS GENAP - WAN - XI TJKT TP 2023/2024

11th Grade

25 Qs

FINAL EXAM INTRODUCTION TO SECURITY

FINAL EXAM INTRODUCTION TO SECURITY

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Alaqsha Gilang

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following firewalls hides or masquerades the private addresses of network hosts?

  • Reverse proxy firewall

Network Address Translation Firewall

  • Proxy server

  • Network layer firewall

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?

  • Scalability

  • Availability

Confidentiality

  • Integrity

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

  • Scalability

  • Integrity

  • Confidentiality

Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?

  • Weaknesses in security practices

  • Race conditions

Access control problems

  • Buffer overflow

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best way to avoid getting spyware on a machine?

  • Install the latest antivirus updates

  • Install the latest web browser updates

Install software only from trusted websites

Install the latest operating system updates

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?

That the Bluetooth adapter is disabled

If the laptop requires user authentication for file and media sharing

That the laptop web browser is operating in private mode

If the laptop has a master password set to secure the passwords stored in the password manager

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?

  • Application layer firewall

  • Transport layer firewall

Reverse proxy server

 Network layer firewall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?