Search Header Logo

Network Security 2

Authored by يسرا التجاني

Computers

University

Used 3+ times

Network Security 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of AAA is responsible for verifying a user's identity?

a) Authorization

b) Accounting

c) Authentication

d) None of the above 

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric cryptography, what type of key is used?

a) Public key

b) Private key

c) Same key for both encryption and decryption

d) None of the above 

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies is designed to detect suspicious activities and potential threats within a network?

a) Firewall

b) IDS

c) DMZ

d) VPN 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A DMZ is often used to:

a) Monitor internal network traffic

b) Isolate sensitive internal servers from external access

c) Encrypt data transmissions

d) Create secure tunnels over public networks 

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which secure protocol is used to provide confidentiality, integrity, and authentication at the network layer?

a) TLS

b) IPsec

c) SSH

d) SSL 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

VPNs are primarily used to:

a) Monitor network traffic

b) Detect and prevent intrusions

c) Create secure, encrypted connections over public networks

d) Isolate public-facing servers from the internal network 

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols can be used to encrypt web traffic?

a) HTTP

b) FTP

c) TLS

d) ICMP 

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers