Network secutiry

Network secutiry

9th Grade

10 Qs

quiz-placeholder

Similar activities

Multiple Choice Quiz: Designing for Impact

Multiple Choice Quiz: Designing for Impact

University

10 Qs

Security and Confidentiality of Electronic Data

Security and Confidentiality of Electronic Data

11th Grade

10 Qs

Understanding Computer Networks

Understanding Computer Networks

12th Grade

10 Qs

cybersecurity-common security infrastructure security

cybersecurity-common security infrastructure security

University

15 Qs

Operating System(2)

Operating System(2)

10th Grade - University

10 Qs

IT Quiz

IT Quiz

12th Grade

10 Qs

Network secutiry

Network secutiry

Assessment

Quiz

Information Technology (IT)

9th Grade

Hard

Created by

Kamran Rashid

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that performs a ‘barrier’ between a potential attacker and the computer system

Anti-malware

Firewall

User Access Levels

Disk Defragmenter

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Defines how a system can be secured through specific rules or requirements

Access Levels

Passwords

Network Policy

Network Access Log

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These define access permissions for a user

Password

User Account

Network Policy

User Access Levels

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is encryption?

Where only the sender and recipient can read the message

A method of bypassing viruses

A form of anti-virus

Where data is translated into code so that only authorised users, or users with the key can decrypt it

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typically, what level of access would a student in a school have on the network?

Access to own documents and the internet

Access to all folders on the network

Full access

Access to all printers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software designed to scan the computer/network and protect against threats to the network but deleting or quarantining the threats.

Anti-malware

Encryption

Firewall

Access Levels

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select all of the physical methods of security from the list below:

Biometrics to access the computer

Biometrics to access the room the computers are stored in

Security Cameras

Account locking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?