Network Security Fundamentals Quiz

Network Security Fundamentals Quiz

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

N5 CS - Security

N5 CS - Security

12th Grade

10 Qs

Data Security

Data Security

10th Grade

19 Qs

6.1 Data Security Cambridge iAS 9618

6.1 Data Security Cambridge iAS 9618

11th Grade

20 Qs

Impacts of Computing

Impacts of Computing

9th - 12th Grade

15 Qs

Types of Database Security Controls

Types of Database Security Controls

11th Grade

20 Qs

The CIA Triad

The CIA Triad

9th Grade

20 Qs

Network Security Fundamentals Quiz

Network Security Fundamentals Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Steven Hahn

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for?

Control, Intelligence, Awareness

Confidentiality, Intelligence, Access

Confidentiality, Integrity, Availability

Control, Integrity, Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a measure to ensure confidentiality?

Two-factor authentication

Encryption

User access policies

Biometric verification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of integrity in information security?

To provide reliable access to data

To protect data from unauthorized access

To ensure the network is available at all times

To protect data and resources from unauthorized changes

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a countermeasure for external threats?

Internal segmentation

Strong firewalls

Employee training

Database monitoring

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does availability ensure in the context of the CIA triad?

Data and resources are not altered without authorization

Data is hidden from unauthorized users

Data is encrypted and secure

Authorized users have reliable access to data and resources

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered an internal threat?

Insider mistakes

Malware

Viruses

Trojan horses

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Common Vulnerabilities and Exposures (CVE) List?

To catalog all antivirus software

To offer a database of strong firewalls

To list all external and internal threats

To provide a centralized resource for known vulnerabilities

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?