Network Security 2

Network Security 2

University

21 Qs

quiz-placeholder

Similar activities

Instrumen Soal Penelitian

Instrumen Soal Penelitian

University

20 Qs

WLAN SECURITY

WLAN SECURITY

University

20 Qs

Quis komputer kelas 9 sem 1

Quis komputer kelas 9 sem 1

9th Grade - University

20 Qs

Review ITE-II

Review ITE-II

University

20 Qs

KSK2023 ulangkaji v1.2 (1-6)

KSK2023 ulangkaji v1.2 (1-6)

KG - University

16 Qs

Module 11

Module 11

9th Grade - Professional Development

20 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

Network Security 2

Network Security 2

Assessment

Quiz

Computers

University

Medium

Created by

يسرا التجاني

Used 3+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of AAA is responsible for verifying a user's identity?

a) Authorization

b) Accounting

c) Authentication

d) None of the above 

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric cryptography, what type of key is used?

a) Public key

b) Private key

c) Same key for both encryption and decryption

d) None of the above 

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies is designed to detect suspicious activities and potential threats within a network?

a) Firewall

b) IDS

c) DMZ

d) VPN 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A DMZ is often used to:

a) Monitor internal network traffic

b) Isolate sensitive internal servers from external access

c) Encrypt data transmissions

d) Create secure tunnels over public networks 

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which secure protocol is used to provide confidentiality, integrity, and authentication at the network layer?

a) TLS

b) IPsec

c) SSH

d) SSL 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

VPNs are primarily used to:

a) Monitor network traffic

b) Detect and prevent intrusions

c) Create secure, encrypted connections over public networks

d) Isolate public-facing servers from the internal network 

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols can be used to encrypt web traffic?

a) HTTP

b) FTP

c) TLS

d) ICMP 

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?