Network Security Fundamentals

Network Security Fundamentals

Professional Development

20 Qs

quiz-placeholder

Similar activities

PC Tech Quiz 1

PC Tech Quiz 1

Professional Development

20 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

Wireless Networks

Wireless Networks

Professional Development

15 Qs

Ports

Ports

Professional Development

20 Qs

Part 1.8

Part 1.8

Professional Development

20 Qs

Encryption

Encryption

Professional Development

15 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Quiz Day 1 - CTIA - Konsep Cyber Threat Intelligence

Professional Development

20 Qs

 Network Security Fundamentals

Network Security Fundamentals

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Osman Hassan

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 5 pts

Media Image

I sit between the internet and the network. I protect the network, by blocking viruses, malware and worms. I can be both hardware and software

Router

Firewall

Ethernet Cable

Modem

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the primary function of a firewall in network security?

To encrypt data

To monitor and control incoming and outgoing network traffic

To detect malware

To manage user access

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is a common encryption protocol used to secure data transmitted over the internet?

HTTP

FTP

SSL/TLS

SMTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the purpose of a network vulnerability assessment?

To install antivirus software

To identify and evaluate security weaknesses in a network

To create a backup of network data

To configure network devices

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which principle is essential for secure network design?

Single point of failure

Open access to all users

Defence in depth

Minimal logging

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of malware is designed to replicate itself and spread to other computers?

Trojan horse

Spyware

Worm

Adware

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which access control mechanism is based on the roles assigned to users?

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

Attribute-Based Access Control (ABAC)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?