
Викторина по сетевой безопасности
Authored by Teili Makasheva
Information Technology (IT)
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the CIA triad in information security?
Confidentiality, Integrity, Availability
Confidentiality, Identification, Authentication
Integrity, Availability, Protection
Authentication, Authorization, Accounting
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following methods is used to ensure data integrity?
File protection
Hashing
Encryption
Authentication
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What type of access control prevents physical access to systems?
Logical access
Physical access
Network access
Administrative access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is multi-factor authentication?
Use of biometric data
Use of smart cards
Use of only a password
Use of two or more verification methods
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of firewall analyzes the state of connections?
Application gateway
Packet filter
Hybrid firewall
Stateful firewall
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following methods is used to protect against malware?
File system
Antivirus software
Firewall
Encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following methods is used to protect against DDoS attacks?
Authentication
Traffic monitoring
Encryption
Backups
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?