Викторина по сетевой безопасности

Викторина по сетевой безопасности

University

8 Qs

quiz-placeholder

Similar activities

Cloud Computing and web services Practice Quizes

Cloud Computing and web services Practice Quizes

University

10 Qs

Quiz on Public Key Infrastructure (PKI)

Quiz on Public Key Infrastructure (PKI)

University

8 Qs

NAT-Q

NAT-Q

9th Grade - University

11 Qs

SAD - BMP - Team 2

SAD - BMP - Team 2

University

3 Qs

Ethical Hacking week #1

Ethical Hacking week #1

University

10 Qs

Basic ICT quiz

Basic ICT quiz

University

10 Qs

Keamanan Berbagi File

Keamanan Berbagi File

10th Grade - University

10 Qs

IT Quiz Bee 2025 - AVERAGE

IT Quiz Bee 2025 - AVERAGE

University

10 Qs

Викторина по сетевой безопасности

Викторина по сетевой безопасности

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Teili Makasheva

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the CIA triad in information security?

Confidentiality, Integrity, Availability

Confidentiality, Identification, Authentication

Integrity, Availability, Protection

Authentication, Authorization, Accounting

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following methods is used to ensure data integrity?

File protection

Hashing

Encryption

Authentication

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of access control prevents physical access to systems?

Logical access

Physical access

Network access

Administrative access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is multi-factor authentication?

Use of biometric data

Use of smart cards

Use of only a password

Use of two or more verification methods

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of firewall analyzes the state of connections?

Application gateway

Packet filter

Hybrid firewall

Stateful firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods is used to protect against malware?

File system

Antivirus software

Firewall

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods is used to protect against DDoS attacks?

Authentication

Traffic monitoring

Encryption

Backups

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a VPN?

To block malware

To manage network traffic

To provide anonymity online

To increase internet speed