(BSIT 3B) IAS Quiz 2 for finals

(BSIT 3B) IAS Quiz 2 for finals

University

10 Qs

quiz-placeholder

Similar activities

DC&E Lesson 5 Quiz

DC&E Lesson 5 Quiz

6th Grade - University

15 Qs

Module 6: Defensive Security

Module 6: Defensive Security

University

10 Qs

CHAPTER 4 Quiz

CHAPTER 4 Quiz

University

10 Qs

CYBER CONCLAVE- ROUND 2

CYBER CONCLAVE- ROUND 2

University

10 Qs

NGAF_Training Quiz

NGAF_Training Quiz

KG - Professional Development

10 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

CNET236 Chapt 14 - Config Authorization & Authentication

CNET236 Chapt 14 - Config Authorization & Authentication

University

10 Qs

Cyber Hygiene

Cyber Hygiene

University

15 Qs

(BSIT 3B) IAS Quiz 2 for finals

(BSIT 3B) IAS Quiz 2 for finals

Assessment

Quiz

Other

University

Medium

Created by

Ma'am Vasquez

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a firewall?

To store data securely

To filter and control network traffic

To increase internet speed

To encrypt data transmission

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a host-based firewall?

Protects all devices in a network

Installed on individual computers

Requires no configuration

Functions without security rules

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one advantage of a firewall?

Allows all network traffic by default

Concentrates security for easier management

Eliminates the need for passwords

Automatically updates all software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a type of authentication?

Password-based

Address-based

Cryptography-based

DNS-based

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three main factors used in authentication?

What you know, what you have, what you are

What you see, what you trust, what you do

What you own, what you see, what you control

What you build, what you say, what you buy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of biometric authentication?

Password

Keycard

Fingerprint

IP address

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one disadvantage of using a firewall?

It can block certain types of network access

It prevents malware installation

It cannot be configured for specific protocols

It makes systems immune to attacks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?