Network Security Fundamentals
You will need to achieve a score of 80% or higher to pass the quiz. If you don’t pass on your first attempt, you can retake the quiz as needed.
Quiz Summary
0 of 7 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 7 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 7
1. Question
In the following answers, what belongs to the “Asset” which we are trying to protect in Information Security?
CorrectIncorrect -
Question 2 of 7
2. Question
Risk is the potential for loss or damage to an asset caused by a threat exploiting a vulnerability, which of the following shows the correct relationship between them?
CorrectIncorrect -
Question 3 of 7
3. Question
CSIRT stands for Computer Security Incident Response Team. Which of the following are the types of CSIRTs?
CorrectIncorrect -
Question 4 of 7
4. Question
In the asymmetric key algorithm, to guarantee the confidentiality, if Alice wants to send a message to Bob and only Bob can read it, which key should Alice use to encrypt the message?
CorrectIncorrect -
Question 5 of 7
5. Question
Which of the following is NOT the component of IPSec?
CorrectIncorrect -
Question 6 of 7
6. Question
Which of the following is NOT a DoS attack?
CorrectIncorrect -
Question 7 of 7
7. Question
When we are providing protections to the access to our infrastructure, which of the following is NOT recommended?
CorrectIncorrect