CNS Quiz 2 D15C

CNS Quiz 2 D15C

University

30 Qs

quiz-placeholder

Similar activities

Cyber Security & Hygiene

Cyber Security & Hygiene

University

30 Qs

Yr 10 Revision 1 Excel, SQL & Networks

Yr 10 Revision 1 Excel, SQL & Networks

10th Grade - University

30 Qs

Quiz 2 (Special Quiz ICT 1)

Quiz 2 (Special Quiz ICT 1)

University

30 Qs

cybersecurity worksheet

cybersecurity worksheet

9th Grade - University

29 Qs

SADP Unit-6.1 Quiz

SADP Unit-6.1 Quiz

University

25 Qs

Network and Internet

Network and Internet

University

30 Qs

IAS 2 Asset Security Quiz 2

IAS 2 Asset Security Quiz 2

University

25 Qs

Chapter 10: Security

Chapter 10: Security

11th Grade - University

25 Qs

CNS Quiz 2 D15C

CNS Quiz 2 D15C

Assessment

Quiz

Computers

University

Medium

Created by

Abhishek Chaudhari

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pretty good privacy (PGP) is used in ______

Browser security

Email security

FTP security

WiFi security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PGP encrypts data by using a block cipher called ______

International data encryption algorithm

Private data encryption algorithm

Internet data encryption algorithm

Local data encryption algorithm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

Kerberos V5

SHA

MD5

Both SHA and MD5

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SSH uses ___________ to authenticate the remote computer.

public-key cryptography

private-key cryptography

any of public-key or private-key

both public-key & private-key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network layer firewall works as a __________

Frame filter

Packet filter

Content filter

Virus filter

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A proxy firewall filters at _________

Physical layer

Data link layer

Network layer

Application layer

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A false positive can be defined as ________

An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior

An alert that indicates nefarious activity on a system that is not running on the network

The lack of an alert for nefarious activity

Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?