Exam CNSA

Exam CNSA

University

•

35 Qs

quiz-placeholder

Similar activities

Kuis DTD TPB 2025

Kuis DTD TPB 2025

University

•

35 Qs

Digital Media Vocabulary and Concepts

Digital Media Vocabulary and Concepts

10th Grade - University

•

30 Qs

HAWKIN'S HUNT ROUND -1 QUIZ

HAWKIN'S HUNT ROUND -1 QUIZ

University

•

30 Qs

REMEDIAL PSAS  (TULIS NAMA LENGKAP DAN KELAS)

REMEDIAL PSAS (TULIS NAMA LENGKAP DAN KELAS)

10th Grade - University

•

40 Qs

Long Quiz # 2 SDL and Project Management

Long Quiz # 2 SDL and Project Management

University

•

40 Qs

ASTS GANJIL 2025/2026 (WAWASAN)

ASTS GANJIL 2025/2026 (WAWASAN)

10th Grade - University

•

30 Qs

BASIS DATA XI 25

BASIS DATA XI 25

11th Grade - University

•

40 Qs

Year 9 ICT Summative Assessment Term 1.2 - 2025/2026

Year 9 ICT Summative Assessment Term 1.2 - 2025/2026

9th Grade - University

•

35 Qs

Exam CNSA

Exam CNSA

Assessment

Quiz

•

Information Technology (IT)

•

University

•

Practice Problem

•

Medium

Created by

widi jaelani

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which is the most important reason for the removal of unused, unnecessary, or unneeded protocols, services, and applications?

Increased security

Increased performance

Less need for administration

Less machine resource use

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Why is network security important for organizations?

It increases network speed

It protects sensitive information

It reduces electricity usage

It simplifies network configurations

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following best describes 'encryption'?

Speeding up data transmission

Compressing data for storage

Creating user-friendly software

Converting data into a secure code

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The act of attempting to appear to be someone you're not in order to gain access to a system is known as which of the following?

Spoofing

DDoS

Replay

Sniffing

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which term refers to the protection of networked systems from misuse or unauthorized access?

Network Optimization

Network Monitoring

Network Security

Network Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is an example of a social engineering attack?

Firewall breach

Phishing

SQL Injection

Man-in-the-Middle attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which of the following is considered an attack vector?

USB drive

Monitor

Keyboard

Printer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?