Network Security Test Review

Network Security Test Review

9th - 12th Grade

•

50 Qs

quiz-placeholder

Similar activities

PERENCANAAN JARINGAN KOMPUTER

PERENCANAAN JARINGAN KOMPUTER

9th Grade

•

50 Qs

SOAL PAT AIJ KELAS XI TKJ

SOAL PAT AIJ KELAS XI TKJ

11th Grade

•

45 Qs

Teknologi Informasi

Teknologi Informasi

10th Grade

•

50 Qs

Year 9 end of year assessment

Year 9 end of year assessment

10th Grade

•

45 Qs

Computing Heroes Quiz KS3

Computing Heroes Quiz KS3

5th - 10th Grade

•

53 Qs

Basic Java with CodeHS

Basic Java with CodeHS

9th - 12th Grade

•

50 Qs

Computer basics

Computer basics

5th - 9th Grade

•

50 Qs

CLASS IX PYTHON  REVISION

CLASS IX PYTHON REVISION

9th Grade

•

48 Qs

Network Security Test Review

Network Security Test Review

Assessment

Quiz

•

Computers

•

9th - 12th Grade

•

Hard

Created by

La'Keisha Carter

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Proximity card

Keypad locks

Biometric locks

Smart card

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?

RIPEMD

MD5

SHA

HMAC

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following encryption mechanisms offers the least security because of weak keys?

TwoFish

AES

IDEA

DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks, if successful, causes a switch to function like a hub?

ARP poisoning

MAC flooding

MAC spoofing

Replay attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of site surveys should be performed first?

Ad hoc

Predictive

Active

Passive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security solutions would prevent a user from reading a file that they did not create?

IPsec

EFS

VPN

Bitlocker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following systems is able to respond to low-level security events without human assistance?

IDS

SIEM

SOAR

Firewall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?