
Network Security Quiz
Authored by Dalia Pulido
Instructional Technology
9th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company transmits sensitive customer information across its network. Which of the following technologies should it use to protect data in motion?
AES encryption
TLS or IPsec
Full disk encryption
Access control lists
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following methods would best protect a database stored on a server from unauthorized access?
Encrypting the database with AES
Using a firewall to block unauthorized users
Implementing a VPN for remote access
Using TLS encryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which entity is responsible for digitally signing and issuing certificates to verify the authenticity of websites and users?
Firewall
Certificate Authority (CA)
Intrusion Prevention System (IPS)
File Integrity Checker
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company assigns employees to specific job roles and grants access permissions accordingly. This is an example of:
Mandatory Access Control (MAC)
Multi-Factor Authentication (MFA)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the Principle of Least Privilege (PoLP)?
Users should have administrator access to all systems
Users should be granted only the minimum permissions necessary to perform their job functions
All users must be assigned to a single security group
Users should have full access to their department's data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure that employees can only access their work applications while connected to the corporate VPN. Which method would enforce this?
Digital Certificate Signing
Network Access Control (NAC)
File Integrity Monitoring
Role-Based Access Control
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the security strategy for SCADA networks?
Complete isolation from external networks
Full integration with public internet
Allowing remote access for all employees
Using strong passwords only
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
50 questions
kisi2 9
Quiz
•
9th Grade
40 questions
PAS teknologi dasar otomotif kelas X tbsm
Quiz
•
10th Grade
50 questions
S04L UTS CLOUD COMPUTING
Quiz
•
University
47 questions
TIK 9 DAILY TEST 2021
Quiz
•
9th Grade
50 questions
PAT4K10
Quiz
•
10th Grade
50 questions
Sistemas Operativos
Quiz
•
12th Grade
40 questions
Prueba Instalaciones Viviendas
Quiz
•
10th Grade
50 questions
Keyboarding Final Exam
Quiz
•
6th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Instructional Technology
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
10 questions
Understanding Meiosis
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
15 questions
Main Idea and Supporting Details.
Quiz
•
4th - 11th Grade
10 questions
Theme
Quiz
•
9th Grade
12 questions
Exponential Growth and Decay
Quiz
•
9th Grade
20 questions
Exponent Rules Review
Quiz
•
8th - 9th Grade
25 questions
Complementary and Supplementary Angles
Quiz
•
7th - 10th Grade