Network Security Quiz

Network Security Quiz

9th Grade

45 Qs

quiz-placeholder

Similar activities

CSIRT_2022

CSIRT_2022

University

50 Qs

Internet and Cybersecurity Mid Unit Assessment

Internet and Cybersecurity Mid Unit Assessment

9th - 12th Grade

40 Qs

ICT 9 Q4 SUMMATIVE TEST PIAGET

ICT 9 Q4 SUMMATIVE TEST PIAGET

9th Grade

50 Qs

Latihan UNBK TKJ 2019

Latihan UNBK TKJ 2019

10th Grade - University

50 Qs

The Internet - Final Recap

The Internet - Final Recap

6th - 12th Grade

45 Qs

TIK KLS 9

TIK KLS 9

9th - 10th Grade

40 Qs

KD 3.2 dan 4.2 Mengevaluasi Jaringan Nirkabel

KD 3.2 dan 4.2 Mengevaluasi Jaringan Nirkabel

11th Grade

40 Qs

TPR 2º ESO The Internet & The Web

TPR 2º ESO The Internet & The Web

9th Grade

46 Qs

Network Security Quiz

Network Security Quiz

Assessment

Quiz

Instructional Technology

9th Grade

Easy

Created by

Dalia Pulido

Used 1+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company transmits sensitive customer information across its network. Which of the following technologies should it use to protect data in motion?

AES encryption

TLS or IPsec

Full disk encryption

Access control lists

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods would best protect a database stored on a server from unauthorized access?

Encrypting the database with AES

Using a firewall to block unauthorized users

Implementing a VPN for remote access

Using TLS encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which entity is responsible for digitally signing and issuing certificates to verify the authenticity of websites and users?

Firewall

Certificate Authority (CA)

Intrusion Prevention System (IPS)

File Integrity Checker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company assigns employees to specific job roles and grants access permissions accordingly. This is an example of:

Mandatory Access Control (MAC)

Multi-Factor Authentication (MFA)

Discretionary Access Control (DAC)

Role-Based Access Control (RBAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Principle of Least Privilege (PoLP)?

Users should have administrator access to all systems

Users should be granted only the minimum permissions necessary to perform their job functions

All users must be assigned to a single security group

Users should have full access to their department's data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure that employees can only access their work applications while connected to the corporate VPN. Which method would enforce this?

Digital Certificate Signing

Network Access Control (NAC)

File Integrity Monitoring

Role-Based Access Control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the security strategy for SCADA networks?

Complete isolation from external networks

Full integration with public internet

Allowing remote access for all employees

Using strong passwords only

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?