Understanding Cyber Security Technologies

Understanding Cyber Security Technologies

University

10 Qs

quiz-placeholder

Similar activities

IGBAJO ND2 BUS ADMIN ASSESSMENT TEST

IGBAJO ND2 BUS ADMIN ASSESSMENT TEST

University

10 Qs

Network Fundamentals-Physical layer

Network Fundamentals-Physical layer

9th Grade - Professional Development

14 Qs

WJEC ICT  - Chapter 2 - The Internet: Packets & Routing

WJEC ICT - Chapter 2 - The Internet: Packets & Routing

10th Grade - University

8 Qs

Additional Excercise (Network Layer) - Router, IPv4 and IPv6

Additional Excercise (Network Layer) - Router, IPv4 and IPv6

University

12 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

NetworkingSecurity_Lecture1_recap

NetworkingSecurity_Lecture1_recap

University

15 Qs

Network and its types

Network and its types

University

10 Qs

INTERNET

INTERNET

University

15 Qs

Understanding Cyber Security Technologies

Understanding Cyber Security Technologies

Assessment

Quiz

Computers

University

Medium

Created by

Kwasi Boafo-Asante

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a firewall in a network?

To increase the speed of the network

To block unauthorised access while permitting outward communication

To store data securely

To provide wireless connectivity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used to encrypt data?

Phishing

RSA

SQL Injection

DDoS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "phishing" refer to in cyber security?

A method of encrypting data

A type of malware that replicates itself

A technique used to trick users into providing sensitive information

A process of scanning networks for vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device is used to connect multiple networks and direct data packets between them?

Switch

Router

Modem

Hub

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of an Intrusion Detection System (IDS)?

To prevent data loss

To detect and alert on potential security breaches

To encrypt sensitive data

To manage user access rights

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that demands payment to restore access to the victim's data?

Spyware

Ransomware

Adware

Trojan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a Virtual Private Network (VPN)?

To increase internet speed

To provide a secure connection over a public network

To block malware

To manage network traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?