Fundamentals of Network Security

Fundamentals of Network Security

University

10 Qs

quiz-placeholder

Similar activities

Quiz 1

Quiz 1

University

11 Qs

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

University

15 Qs

QUIZ #1

QUIZ #1

University

10 Qs

OSI-LAYER

OSI-LAYER

University

10 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Network Security L1-Introduction

Network Security L1-Introduction

University

14 Qs

DoS Attack Quiz

DoS Attack Quiz

University

10 Qs

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

8th Grade - University

14 Qs

Fundamentals of Network Security

Fundamentals of Network Security

Assessment

Quiz

Computers

University

Easy

Created by

Dr. Raipur.

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a firewall?

To enhance network speed by increasing bandwidth.

To provide a backup solution for network devices.

To store data securely in the cloud.

To protect networks by controlling traffic and preventing unauthorized access.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define the term 'malware'.

Malware refers to software that enhances system performance.

Malware is a programming language for creating applications.

Malware is a type of hardware used in computers.

Malware is software designed to disrupt, damage, or gain unauthorized access to computer systems.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does VPN stand for and what is its purpose?

Virtual Protected Network

Virtual Private Network

Virtual Public Network

Variable Private Network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the concept of 'phishing'.

Phishing is a method of securing sensitive information through encryption.

Phishing is a type of software used to enhance online security.

Phishing is a cyber attack that deceives individuals into revealing sensitive information by pretending to be a trustworthy source.

Phishing refers to the process of creating strong passwords for online accounts.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between symmetric and asymmetric encryption?

Symmetric encryption is used for digital signatures.

Symmetric encryption uses one key for both encryption and decryption, while asymmetric encryption uses a pair of keys.

Asymmetric encryption uses a single key for both processes.

Symmetric encryption is faster than asymmetric encryption.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack?

A DDoS attack is a method to enhance service performance.

A DDoS attack is a type of software used for network monitoring.

A DDoS attack is a malicious attempt to disrupt a service by overwhelming it with traffic from multiple sources.

A DDoS attack is a security measure to protect against data breaches.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name one common protocol used for secure data transmission.

SMTP

FTP

POP3

HTTPS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?