Network Security Quiz

Network Security Quiz

9th Grade

45 Qs

quiz-placeholder

Similar activities

Ôn tập: KĨ THUẬT TRỒNG TRỌT

Ôn tập: KĨ THUẬT TRỒNG TRỌT

6th - 12th Grade

50 Qs

Latihan PTS kelas XI

Latihan PTS kelas XI

11th Grade

40 Qs

Terminología y conceptos de la instrumentación

Terminología y conceptos de la instrumentación

University - Professional Development

40 Qs

Latihan PTS kelas X

Latihan PTS kelas X

11th Grade

40 Qs

S1T1: El proyecto técnico y búsqueda de información

S1T1: El proyecto técnico y búsqueda de información

11th Grade

40 Qs

QUIMESTRE 1(10-2019-2020)

QUIMESTRE 1(10-2019-2020)

10th Grade

50 Qs

Położenie i granice Polski, przeszłość, góry i zlodowacenia

Położenie i granice Polski, przeszłość, góry i zlodowacenia

7th Grade - Professional Development

47 Qs

TRY OUT MESIN

TRY OUT MESIN

12th Grade

40 Qs

Network Security Quiz

Network Security Quiz

Assessment

Quiz

Instructional Technology

9th Grade

Easy

Created by

Dalia Pulido

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company transmits sensitive customer information across its network. Which of the following technologies should it use to protect data in motion?

AES encryption

TLS or IPsec

Full disk encryption

Access control lists

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods would best protect a database stored on a server from unauthorized access?

Encrypting the database with AES

Using a firewall to block unauthorized users

Implementing a VPN for remote access

Using TLS encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which entity is responsible for digitally signing and issuing certificates to verify the authenticity of websites and users?

Firewall

Certificate Authority (CA)

Intrusion Prevention System (IPS)

File Integrity Checker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company assigns employees to specific job roles and grants access permissions accordingly. This is an example of:

Mandatory Access Control (MAC)

Multi-Factor Authentication (MFA)

Discretionary Access Control (DAC)

Role-Based Access Control (RBAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Principle of Least Privilege (PoLP)?

Users should have administrator access to all systems

Users should be granted only the minimum permissions necessary to perform their job functions

All users must be assigned to a single security group

Users should have full access to their department's data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure that employees can only access their work applications while connected to the corporate VPN. Which method would enforce this?

Digital Certificate Signing

Network Access Control (NAC)

File Integrity Monitoring

Role-Based Access Control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the security strategy for SCADA networks?

Complete isolation from external networks

Full integration with public internet

Allowing remote access for all employees

Using strong passwords only

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Instructional Technology