BAB 11

BAB 11

University

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Knowledge Assessment

Cybersecurity Knowledge Assessment

University

25 Qs

Hackers?

Hackers?

University

20 Qs

Information Security Quiz

Information Security Quiz

University

21 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

Computer Security Measures

Computer Security Measures

12th Grade - University

19 Qs

Wireless Network Security

Wireless Network Security

University

20 Qs

Knowing Yourself & Enemy

Knowing Yourself & Enemy

University

19 Qs

BAB 11

BAB 11

Assessment

Quiz

Computers

University

Medium

Created by

amira akifah

Used 37+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the primary goals of network security?

Speed, cost, usability

Integrity, availability, confidentiality

Encryption, authentication, usability

Complexity, efficiency, flexibility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a security threat?

Virus

Firewall

Trojan horse

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a firewall in network security?

Prevents unauthorized access to a network

Detects and removes malware

Encrypts all data in a network

Increases internet speed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves sending packets with a fake source address?

DDoS attack

IP Spoofing

Phishing

Man-in-the-Middle attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to encrypt data in a VPN?

HTTPS

IPSec

FTP

SMTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method for user authentication?

Biometrics

Phishing

DDoS

Malware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a denial-of-service (DoS) attack?

An attack that infects a computer with a virus

An attack that prevents users from accessing a system

A method of encrypting data

A technique used to create secure passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?