Network Security Test Review

Network Security Test Review

9th - 12th Grade

50 Qs

quiz-placeholder

Similar activities

Test Internet

Test Internet

9th Grade

50 Qs

CPU COMPONENTES

CPU COMPONENTES

9th - 12th Grade

47 Qs

Intro to Computing Midterms

Intro to Computing Midterms

12th Grade

50 Qs

UH ORIENTASI DASAR TEKNIK JARINGAN KOMPUTER DAN TELEKOMUNIKASI

UH ORIENTASI DASAR TEKNIK JARINGAN KOMPUTER DAN TELEKOMUNIKASI

10th Grade - University

50 Qs

PENILAIAN TENGAH SEMESTER 1 TIK KELAS 9 TAHUN 2020

PENILAIAN TENGAH SEMESTER 1 TIK KELAS 9 TAHUN 2020

9th Grade

50 Qs

Sumatif Jaringan Kmputer dan Internet

Sumatif Jaringan Kmputer dan Internet

10th Grade

50 Qs

Sec-D  Javascript-1

Sec-D Javascript-1

12th Grade - University

52 Qs

quizz scratch

quizz scratch

12th Grade

50 Qs

Network Security Test Review

Network Security Test Review

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

La'Keisha Carter

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which kind of access control technology allows more than just the identity of an individual to be transmitted wirelessly to either allow or deny access?

Proximity card

Keypad locks

Biometric locks

Smart card

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?

RIPEMD

MD5

SHA

HMAC

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following encryption mechanisms offers the least security because of weak keys?

TwoFish

AES

IDEA

DES

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks, if successful, causes a switch to function like a hub?

ARP poisoning

MAC flooding

MAC spoofing

Replay attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of site surveys should be performed first?

Ad hoc

Predictive

Active

Passive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security solutions would prevent a user from reading a file that they did not create?

IPsec

EFS

VPN

Bitlocker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following systems is able to respond to low-level security events without human assistance?

IDS

SIEM

SOAR

Firewall

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?