
Chapter 7. Network Perimeter Security
Computers, Other Sciences, Professional Development
University
Used 28+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool would you use if you want to view the contents of a packet?
TDR
Port scanner
Protocol analyzer
Loopback adapter
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The honeypot concept is enticing to administrators because
It enables them to observe attacks.
It traps an attacker in a network.
It bounces attacks back at the attacker.
It traps a person physically between two locked doors.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James has detected an intrusion in his company. What should he check first?
DNS logs
Firewall logs
The Event Viewer
Performance logs
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following devices should you employ to protect your network? (Select the best answer.)
Protocol analyzer
Firewall
DMS
Proxy server
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which device’s log file will show access control lists and who was allowed access and who wasn’t?
Firewall
Smartphone
Performance Monitor
IP proxy
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where are software firewalls usually located?
On routers
On servers
On Clients
On every computer
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where is the optimal place to have a proxy server?
In between two private networks
In between a private network and a public network
In between two public networks
On all of the servers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?