Module

Module

University

12 Qs

quiz-placeholder

Similar activities

Quiz You Are Smarter Than Scammer

Quiz You Are Smarter Than Scammer

University

15 Qs

IT Quiz Bee 2025 - DIFFICULT

IT Quiz Bee 2025 - DIFFICULT

University

10 Qs

Computer Networking

Computer Networking

University

10 Qs

LINKS Cyber Youth Challenge - Round 1

LINKS Cyber Youth Challenge - Round 1

University

10 Qs

Information Assurance CSF

Information Assurance CSF

University

8 Qs

Ethics - Week 5 Revision

Ethics - Week 5 Revision

University

10 Qs

Understanding Data and Encoding

Understanding Data and Encoding

6th Grade - University

10 Qs

PART 7: NETWORK SECURITY

PART 7: NETWORK SECURITY

University

10 Qs

Module

Module

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Divina 2908

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Identify the correct expansion of CNSS.

Committee on National Security Systems

Commission on National Security Solutions

Council for National Systems Security

Committee for National Secure Systems

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

List the three types of controls commonly used to secure databases.


Legal, operational, and financial controls

External, internal, and automated controls

Managerial, technical, and physical controls

Manual, adaptive, and preventive controls

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Explain why physical security alone is no longer sufficient for protecting networked information systems.

Because traditional physical security tools cannot be used in cloud environments

Because most organizations now outsource their IT infrastructure to third parties

Because hardware components are becoming obsolete and need constant upgrades

Because network connectivity introduces new security threats that require digital defenses like firewalls and intrusion detection systems

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Discuss the importance of implementing multi-factor authentication in securing access to sensitive information.

It simplifies the user experience by eliminating the need for passwords

It is a legal requirement for all organizations

It provides an additional layer of security beyond just passwords

It reduces the need for strong passwords

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the primary differences between symmetric and asymmetric encryption?

Asymmetric encryption is used for data at rest, while symmetric is for data in transit

Symmetric encryption is slower than asymmetric encryption

Symmetric encryption uses a single key, while asymmetric uses a pair of keys

Symmetric encryption is more secure than asymmetric encryption

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What does the acronym DLP stand for in the context of data security?

Data Lifecycle Policy

Data Loss Prevention

Data Leakage Protocol

Digital Loss Protection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the key benefits of using a Virtual Private Network (VPN) for secure internet access?

It improves internet speed by reducing latency

It encrypts internet traffic to protect user privacy

It allows users to bypass geographical restrictions on content

It is a mandatory requirement for all online transactions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?