
Unit 3 Cyber Security - Measures to protect
Authored by Mike Smith
Computers
11th Grade
Used 29+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Identifies network weaknesses to see what is possible .
Penetration testing
Vulnerability testing
Sandboxing
Network intrusion detection system (NIDS)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Checks and identifies threats based on normal expected network behaviors.
Honey pot
Distributed intrusion detection system (DIDS)
Anomaly based
Signature based
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identifies and exploits vulnerabilities in a system.
Vulnerability testing
Intrusion prevention system
Host intrusion detection system (HIDS)
Penetration testing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Looks for specific network patterns generate by known malware.
Signature based
Host intrusion detection system (HIDS)
Anomaly based
Security functionality
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Testing a system by providing invalid, unexpected and random data.
Security functionality
Fuzzing
Penetration testing
Honey pot
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Proactive monitoring of unwanted intruders e.g. firewall.
Intrusion prevention system
Fuzzing
Signature based
Network intrusion detection system (NIDS)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Used to identify flaws in mechanisms that are meant to protect data and functionality.
Security functionality
Intrusion detection system (IDS)
Honey pot
Signature based
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?