Network Security Quiz

Network Security Quiz

9th Grade

45 Qs

quiz-placeholder

Similar activities

Computer Science pre-test 9th grade

Computer Science pre-test 9th grade

9th Grade

50 Qs

First Quizz

First Quizz

10th - 11th Grade

50 Qs

OSI Model Quiz

OSI Model Quiz

12th Grade

48 Qs

ICT 9 2nd Quarter Review

ICT 9 2nd Quarter Review

9th Grade - University

50 Qs

AP: CSP Units 1 & 2 Review

AP: CSP Units 1 & 2 Review

9th - 12th Grade

40 Qs

APPTITUDE TEST

APPTITUDE TEST

University

50 Qs

UA Local #467 TCP/IP/BBMD Networking Quizizz

UA Local #467 TCP/IP/BBMD Networking Quizizz

12th Grade

40 Qs

Diagnostic Quiz ICT

Diagnostic Quiz ICT

9th - 10th Grade

40 Qs

Network Security Quiz

Network Security Quiz

Assessment

Quiz

Instructional Technology

9th Grade

Easy

Created by

Dalia Pulido

Used 1+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company transmits sensitive customer information across its network. Which of the following technologies should it use to protect data in motion?

AES encryption

TLS or IPsec

Full disk encryption

Access control lists

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods would best protect a database stored on a server from unauthorized access?

Encrypting the database with AES

Using a firewall to block unauthorized users

Implementing a VPN for remote access

Using TLS encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which entity is responsible for digitally signing and issuing certificates to verify the authenticity of websites and users?

Firewall

Certificate Authority (CA)

Intrusion Prevention System (IPS)

File Integrity Checker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company assigns employees to specific job roles and grants access permissions accordingly. This is an example of:

Mandatory Access Control (MAC)

Multi-Factor Authentication (MFA)

Discretionary Access Control (DAC)

Role-Based Access Control (RBAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Principle of Least Privilege (PoLP)?

Users should have administrator access to all systems

Users should be granted only the minimum permissions necessary to perform their job functions

All users must be assigned to a single security group

Users should have full access to their department's data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure that employees can only access their work applications while connected to the corporate VPN. Which method would enforce this?

Digital Certificate Signing

Network Access Control (NAC)

File Integrity Monitoring

Role-Based Access Control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the security strategy for SCADA networks?

Complete isolation from external networks

Full integration with public internet

Allowing remote access for all employees

Using strong passwords only

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?