Search Header Logo

Security+ Ch 6

Authored by Terry Nguyen

Computers

10th - 12th Grade

Used 10+ times

Security+ Ch 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?

Router
Hub
Virtual private network
SIEM device

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization's secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?

A bridge will block packets between two different types of networks.
A bridge cannot be used on any Internet connection.
A bridge would block packets from reaching the Internet.
A bridge could permit access to the secured wired network from the unsecured wireless network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these would NOT be a filtering mechanism found in a firewall ACL rule?

Source address

Direction

Date

Protocol

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices can identify the application that send packets and then make decisions about filtering based on it?

Internet content filter
Application-based firewall
Reverse proxy
Web security gateway

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which function does an Internet content filter NOT perform?

Intrusion detection

URL filtering

Malware inspection

Content inspection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does network address translation (NAT) improve security?

It filters based on protocol
It discards unsolicited packets
It masks the IP address of the NAT device
NATs do not improve security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Francisco was asked by a student intern to explain the danger of MAC flooding attack on a switch. What would Francisco say?

Once the MAC address table is full the switch functions like a network hub.
A MAC flooding attack will filter to the local host computer's MAC-to-IP address tables and prevent these hosts from reaching the network.
In a defense of a MAC flooding attack network routers will freeze and not permit any incoming traffic.
A MAC flooding attack will prevent load balancers from identifying the correct VIP of the servers.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?