Search Header Logo

Network Security Quiz

Authored by Dalia Pulido

Instructional Technology

9th Grade

Used 1+ times

Network Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company transmits sensitive customer information across its network. Which of the following technologies should it use to protect data in motion?

AES encryption

TLS or IPsec

Full disk encryption

Access control lists

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods would best protect a database stored on a server from unauthorized access?

Encrypting the database with AES

Using a firewall to block unauthorized users

Implementing a VPN for remote access

Using TLS encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which entity is responsible for digitally signing and issuing certificates to verify the authenticity of websites and users?

Firewall

Certificate Authority (CA)

Intrusion Prevention System (IPS)

File Integrity Checker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company assigns employees to specific job roles and grants access permissions accordingly. This is an example of:

Mandatory Access Control (MAC)

Multi-Factor Authentication (MFA)

Discretionary Access Control (DAC)

Role-Based Access Control (RBAC)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Principle of Least Privilege (PoLP)?

Users should have administrator access to all systems

Users should be granted only the minimum permissions necessary to perform their job functions

All users must be assigned to a single security group

Users should have full access to their department's data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure that employees can only access their work applications while connected to the corporate VPN. Which method would enforce this?

Digital Certificate Signing

Network Access Control (NAC)

File Integrity Monitoring

Role-Based Access Control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the security strategy for SCADA networks?

Complete isolation from external networks

Full integration with public internet

Allowing remote access for all employees

Using strong passwords only

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?