IAS Finals Reviewer

IAS Finals Reviewer

University

24 Qs

quiz-placeholder

Similar activities

Jadi Programmer | Kampung Koding

Jadi Programmer | Kampung Koding

10th Grade - Professional Development

20 Qs

FINAL TERM PENGANTAR TEKNOLOGI INFORMASI

FINAL TERM PENGANTAR TEKNOLOGI INFORMASI

University

20 Qs

Kuiz 3

Kuiz 3

12th Grade - University

20 Qs

UPS3 : Storage and Adapter Cards

UPS3 : Storage and Adapter Cards

12th Grade - University

20 Qs

INTERNET

INTERNET

University

20 Qs

Network topologies

Network topologies

8th Grade - University

20 Qs

1.1 Information technology

1.1 Information technology

University

20 Qs

Basic of Computer and Network

Basic of Computer and Network

8th Grade - University

20 Qs

IAS Finals Reviewer

IAS Finals Reviewer

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Kalo ‎

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

method by which systems determine whether and how to admit a user into a trusted area of the organization—that is, information systems, restricted areas such as computer rooms, and the entire physical location.

Entry Control
Permission Management
User Authentication
Access Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In information security, a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network.

Firewall
Antivirus
Encryption
Router

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

private data network that uses the public telecommunications infrastructure to create a means for private communication via a tunneling protocol coupled with security procedures

Virtual Protected Network (VPN)
Virtual Public Network (VPN)
Virtual Private Network (VPN)
Virtual Personal Network (VPN)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In general, all access control approaches rely on the following four mechanisms, which represent the four fundamental functions of access control systems:

Identification, Authentication, Authorization,

Accountability

Authentication, Authorization, Auditing, Encryption

Identification, Validation, Permission, Monitoring

Authentication, Authorization, Auditing, Accountability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are architectural implementations of firewalls?

Single Bastion Hosts, Screened Host Firewalls, Screened Subnet Firewalls

Network-based, Host-based, Application-based

Static, Dynamic, Hybrid

Inbound, Outbound, Bothway

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The general term for a system that can both detect and modify its configuration and environment to prevent intrusions. It encompasses the functions of both intrusion detection systems and intrusion prevention technology.

Intrusion Detection and Prevention Service (IDPS)
Intrusion Detection and Prevention Software (IDPS)
Intrusion Detection and Protection System (IDPS)
Intrusion Detection and Prevention System (IDPS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An adverse event in which an attacker attempts to gain entry into an information system or disrupt its normal operations, almost always with the intent to do harm.

Data breach
Phishing attack
Malware infection

Intrusion

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?