ISF 1

ISF 1

University

20 Qs

quiz-placeholder

Similar activities

RIDDLE_IT_OUT

RIDDLE_IT_OUT

University

20 Qs

Revision

Revision

University

25 Qs

Networks & the Internet Quiz

Networks & the Internet Quiz

12th Grade - University

25 Qs

NET102:  Quiz No. 1

NET102: Quiz No. 1

University

20 Qs

networks module 1

networks module 1

University

19 Qs

ISP and Data Packets Part 2

ISP and Data Packets Part 2

University

15 Qs

Theory Test 2 - Network & Data Communication

Theory Test 2 - Network & Data Communication

University

19 Qs

Unit 1 Basic Computer Knowledge Quiz

Unit 1 Basic Computer Knowledge Quiz

University

18 Qs

ISF 1

ISF 1

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Wayground Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main advantage of using Network Time Protocol (NTP) in network security?

It synchronizes system clocks to ensure accurate event logging

It encrypts data during transmission

It provides a firewall for network protection

It monitors network traffic for anomalies

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes a Living-off-the-Land (LotL) attack difficult to detect?

The attacker does not install any new files or software

The attacker uses advanced encryption techniques

The attacker operates during off-peak hours

The attacker targets only high-profile individuals

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a checksum in data integrity checks?

To verify that a file has not been altered during transfer

To increase the file size for security purposes

To compress the data for faster transmission

To encrypt the file for protection against unauthorized access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about steganography is TRUE?

It makes hidden messages undetectable under normal viewing

It is a method of encrypting messages

It is primarily used for data compression

It requires a special software to decode hidden messages

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The accuracy, consistency, and trustworthiness of data across its entire lifecycle

integrity

validity

reliability

accuracy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of network segmentation?

To isolate different network zones for improved security

To increase network speed by reducing traffic

To simplify network management and configuration

To allow unrestricted access to all devices

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is suggested for creating security policies?

ISO 27001 Guidelines

NIST Cybersecurity Framework

SANS Security Policy Templates

COBIT Framework

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?