0 of 10 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
“Protects the data on a system from falling into the wrong hand as any intercepted data will be unreadable.”…is an example of what security method?
“software which continually monitors network traffic, so that after an attack, suspicious data packets can be analysed”…is an example of what security method?
“A set of rules and procedures that network users must follow to reduce the vulnerability of a network”…is an example of what security method?
“Experts try to simulate a range of network attacks (such as Denial of Service attacks (DoS), SQL injections and Brute Force Attacks) in an attempt to discover any weaknesses in the system “…is an example of what security method?
What is the purpose of penetration testing?
Why is it important to keep anti-virus software up to date?
How does a firewall improve network security?
What is a key feature of a strong password?
What does encryption do to data before it is sent across a network?
What is the role of anti-spyware software?