Network secutiry

Network secutiry

9th Grade

10 Qs

quiz-placeholder

Similar activities

Uticaj računara

Uticaj računara

9th Grade

13 Qs

Web 1.1 Bacaan

Web 1.1 Bacaan

11th Grade

10 Qs

PAS 2024 KELAS 11

PAS 2024 KELAS 11

11th Grade

15 Qs

Quiz  Elemen DSI 2024

Quiz Elemen DSI 2024

12th Grade

10 Qs

Quiz 1-15

Quiz 1-15

9th - 12th Grade

15 Qs

ONLINE ICT QUIZ, 2024

ONLINE ICT QUIZ, 2024

12th Grade

10 Qs

LD siskom SE

LD siskom SE

10th Grade - University

10 Qs

Počítačová grafika

Počítačová grafika

6th Grade - University

10 Qs

Network secutiry

Network secutiry

Assessment

Quiz

Information Technology (IT)

9th Grade

Hard

Created by

Kamran Rashid

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that performs a ‘barrier’ between a potential attacker and the computer system

Anti-malware

Firewall

User Access Levels

Disk Defragmenter

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Defines how a system can be secured through specific rules or requirements

Access Levels

Passwords

Network Policy

Network Access Log

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These define access permissions for a user

Password

User Account

Network Policy

User Access Levels

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is encryption?

Where only the sender and recipient can read the message

A method of bypassing viruses

A form of anti-virus

Where data is translated into code so that only authorised users, or users with the key can decrypt it

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typically, what level of access would a student in a school have on the network?

Access to own documents and the internet

Access to all folders on the network

Full access

Access to all printers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software designed to scan the computer/network and protect against threats to the network but deleting or quarantining the threats.

Anti-malware

Encryption

Firewall

Access Levels

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select all of the physical methods of security from the list below:

Biometrics to access the computer

Biometrics to access the room the computers are stored in

Security Cameras

Account locking

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?