BCSE317L - Information Security Quiz-2

BCSE317L - Information Security Quiz-2

University

10 Qs

quiz-placeholder

Similar activities

NS: Chapter 4: FIREWALL

NS: Chapter 4: FIREWALL

University

11 Qs

IDPS Quiz 03

IDPS Quiz 03

University

10 Qs

Unidad 11. Herramientas de detección de intrusiones

Unidad 11. Herramientas de detección de intrusiones

University

10 Qs

Prueba de Seguridad Informática

Prueba de Seguridad Informática

12th Grade - University

15 Qs

IT213 Intro CS Chap4

IT213 Intro CS Chap4

University

5 Qs

Cybersecurity Fundamentals Week 6 Quiz

Cybersecurity Fundamentals Week 6 Quiz

KG - University

10 Qs

Quiz 2 - Operating System Patches & Security Configuration

Quiz 2 - Operating System Patches & Security Configuration

University

8 Qs

Google Prof Cloud Network - pt 3

Google Prof Cloud Network - pt 3

University

15 Qs

BCSE317L - Information Security Quiz-2

BCSE317L - Information Security Quiz-2

Assessment

Quiz

Computers

University

Easy

Created by

Manjula R

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the two main types of firewall used in network security?

Packet-filter firewall and proxy-based firewall

Hardware firewall and software firewall

Firewall 1 and Firewall 2

Firewall A and Firewall B

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes a packet-filter firewall from a proxy firewall in a corporate network?

A packet-filter firewall is more expensive than a proxy firewall

A packet-filter firewall is designed for remote offices, while a proxy firewall is for headquarters

A packet-filter firewall is software-based, while a proxy firewall is hardware-based

A packet-filter firewall filters based on network and transport layer headers, while a proxy firewall filters based on the application layer

3.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

In a deauthentication attack, which device is typically the first target?
Router firewall
Access point
End-user device
Ethernet switch

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is true about data security?

Data security is the protection of programs and data in computers and communication systems against unauthorized access

It refers to the right of individuals or organizations to deny or restrict the collection and use of information

Data security requires system managers to reduce unauthorized access to the systems by building physical arrangements and software checks.

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common database security attack that exploits vulnerabilities in web applications to manipulate database queries?

Phishing

SQL Injection

Brute-force attack

Denial of Service (DoS)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves an attacker gaining unauthorized access to a database by impersonating a legitimate user or by exploiting weak authentication mechanisms?

Cross-Site Scripting (XSS)

Man-in-the-Middle (MitM)

Brute-force attack

Denial of Service (DoS)

None

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of database auditing in database security?

To encrypt sensitive data

To prevent unauthorized access to data

To monitor database activity

To hide sensitive data from authorized users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?