
Security+ Ch 6
Authored by Terry Nguyen
Computers
10th - 12th Grade
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization's secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these would NOT be a filtering mechanism found in a firewall ACL rule?
Source address
Direction
Date
Protocol
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following devices can identify the application that send packets and then make decisions about filtering based on it?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which function does an Internet content filter NOT perform?
Intrusion detection
URL filtering
Malware inspection
Content inspection
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does network address translation (NAT) improve security?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Francisco was asked by a student intern to explain the danger of MAC flooding attack on a switch. What would Francisco say?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?