0% found this document useful (0 votes)
323 views4 pages

Information and Network Security - PreQuiz - Attempt Review

The document summarizes a quiz on information and network security topics. It provides 10 multiple choice questions testing knowledge of concepts like encryption, firewalls, malware, CIA triad, ransomware, man-in-the-middle attacks, data integrity, port scanning, routers, and information security policies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
323 views4 pages

Information and Network Security - PreQuiz - Attempt Review

The document summarizes a quiz on information and network security topics. It provides 10 multiple choice questions testing knowledge of concepts like encryption, firewalls, malware, CIA triad, ransomware, man-in-the-middle attacks, data integrity, port scanning, routers, and information security policies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1/24/24, 11:04 PM Information and Network Security - PreQuiz: Attempt review


 Dashboard / Primer 2.0 - Infrastructure Security / Stage 1 / Security & Cybersecurity fundamentals / Information and Network Security

Quiz review
Started on Wednesday, 24 January 2024, 10:59 PM
State Finished
Completed on Wednesday, 24 January 2024, 11:04 PM
Time taken 4 mins 18 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

What does encryption in network security help with?

Increasing network traffic


Reducing security
46684
Protecting data from strangers
Making the network faster

The correct answer is: Protecting data from strangers

Question 2
Correct

Mark 1.00 out of 1.00

46684
What's the first line of defense to protect your network from online threats?

Password
Firewall
Keyboard
Social media

The correct answer is: Firewall

Question 3
46684
Correct

Mark 1.00 out of 1.00

What is the term for software that can harm your computer, often pretending to be legitimate?

Malware
Firewall
Antivirus
Goodware

The correct answer is: Malware


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1056565&cmid=8051 1/4
1/24/24, 11:04 PM Information and Network Security - PreQuiz: Attempt review

Question 4
Correct

Mark 1.00 out of 1.00

What does CIA stand for in cybersecurity?

A famous rock band


Confidentiality, Integrity, and Availability
Central Intelligence Agency
Cybersecurity Information Alliance

The correct answer is: Confidentiality, Integrity, and Availability

Question 5
Correct

Mark 1.00 out of 1.00

46684
What kind of malware locks your computer and asks for money to unlock it?

Dancingware
Adware
Ransomware
Smileyware

The correct answer is: Ransomware

Question 6
Correct
46684
Mark 1.00 out of 1.00

What kind of attack secretly eavesdrops on your communication without your knowledge?

Phone call attack


Man-in-the-Middle (MiTM) attack
Wi-Fi attack
Social media attack

The correct answer is: Man-in-the-Middle (MiTM) attack


46684


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1056565&cmid=8051 2/4
1/24/24, 11:04 PM Information and Network Security - PreQuiz: Attempt review

Question 7
Correct

Mark 1.00 out of 1.00

What's the term for ensuring data is not tampered with by unauthorized people?

Data Integrity
Data Encryption
Data Latency
Data Replication

The correct answer is: Data Integrity

Question 8
Correct

Mark 1.00 out of 1.00

46684
What's a common way for attackers to find open doors in your network to hack into?

Turning off the computer


Port scanning
Wi-Fi password
Internet Explorer

The correct answer is: Port scanning

Question 9
Correct
46684
Mark 1.00 out of 1.00

Which of the following is like a digital barrier that protects your network from online threats?

Keyboard
Password
Social media
Router

The correct answer is: Router


46684


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1056565&cmid=8051 3/4
1/24/24, 11:04 PM Information and Network Security - PreQuiz: Attempt review

Question 10
Correct

Mark 1.00 out of 1.00

Why do we use information security policies in an organization?

To reduce employee workload


To protect sensitive information
To increase data access
To share everything with the public

The correct answer is: To protect sensitive information

◄ Cyber Security Fundamentals course Introduction

Jump to...
46684 Introduction to Information Security ►

46684

46684


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1056565&cmid=8051 4/4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy