
Network Security Quiz
Authored by Dalia Pulido
Instructional Technology
9th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company transmits sensitive customer information across its network. Which of the following technologies should it use to protect data in motion?
AES encryption
TLS or IPsec
Full disk encryption
Access control lists
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following methods would best protect a database stored on a server from unauthorized access?
Encrypting the database with AES
Using a firewall to block unauthorized users
Implementing a VPN for remote access
Using TLS encryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which entity is responsible for digitally signing and issuing certificates to verify the authenticity of websites and users?
Firewall
Certificate Authority (CA)
Intrusion Prevention System (IPS)
File Integrity Checker
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company assigns employees to specific job roles and grants access permissions accordingly. This is an example of:
Mandatory Access Control (MAC)
Multi-Factor Authentication (MFA)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the Principle of Least Privilege (PoLP)?
Users should have administrator access to all systems
Users should be granted only the minimum permissions necessary to perform their job functions
All users must be assigned to a single security group
Users should have full access to their department's data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure that employees can only access their work applications while connected to the corporate VPN. Which method would enforce this?
Digital Certificate Signing
Network Access Control (NAC)
File Integrity Monitoring
Role-Based Access Control
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the security strategy for SCADA networks?
Complete isolation from external networks
Full integration with public internet
Allowing remote access for all employees
Using strong passwords only
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?