Network Security Test Review

Network Security Test Review

9th - 12th Grade

50 Qs

quiz-placeholder

Similar activities

Latihan PTS-2 Informatika 9

Latihan PTS-2 Informatika 9

9th Grade

50 Qs

PAS_TIK_Kelas XII

PAS_TIK_Kelas XII

12th Grade

50 Qs

Ulangan Harian Bab V TIK Kelas XI

Ulangan Harian Bab V TIK Kelas XI

11th Grade

50 Qs

ASSESMENT DIAGNOSTIK AWAL FASE E

ASSESMENT DIAGNOSTIK AWAL FASE E

10th Grade

50 Qs

Intro to Modeling and 3d Printing

Intro to Modeling and 3d Printing

9th Grade

47 Qs

eSkill-8

eSkill-8

12th Grade

54 Qs

Quiz TIK

Quiz TIK

12th Grade

45 Qs

K11 - Giữa HK II - CS Cánh diều

K11 - Giữa HK II - CS Cánh diều

11th Grade

55 Qs

Network Security Test Review

Network Security Test Review

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

La'Keisha Carter

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Proximity card

Keypad locks

Biometric locks

Smart card

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?

RIPEMD

MD5

SHA

HMAC

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following encryption mechanisms offers the least security because of weak keys?

TwoFish

AES

IDEA

DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks, if successful, causes a switch to function like a hub?

ARP poisoning

MAC flooding

MAC spoofing

Replay attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of site surveys should be performed first?

Ad hoc

Predictive

Active

Passive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security solutions would prevent a user from reading a file that they did not create?

IPsec

EFS

VPN

Bitlocker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following systems is able to respond to low-level security events without human assistance?

IDS

SIEM

SOAR

Firewall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?