BCS Network Security Test 1

BCS Network Security Test 1

University - Professional Development

20 Qs

quiz-placeholder

Similar activities

wstęp cz1 kl6

wstęp cz1 kl6

1st Grade

18 Qs

Schoolpoortquiz Altena

Schoolpoortquiz Altena

1st Grade - University

16 Qs

Innovación

Innovación

1st - 3rd Grade

20 Qs

BERLATIH SOAL PPPK Part 2

BERLATIH SOAL PPPK Part 2

Professional Development

15 Qs

PARÓNIMOS

PARÓNIMOS

6th Grade

20 Qs

Get to Know You

Get to Know You

9th Grade

18 Qs

IDE Tema 2

IDE Tema 2

University

15 Qs

AFR Palembang

AFR Palembang

6th Grade

15 Qs

BCS Network Security Test 1

BCS Network Security Test 1

Assessment

Quiz

Instructional Technology, Education, Professional Development

University - Professional Development

Practice Problem

Easy

Created by

Chris Whitehead

Used 363+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A network firewall that tracks the operating state and characteristics of network connections traversing it.

Stateful

Stateless

Honeypot

Fly trap

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems.

intrusion detection system

Fly trap

Honeypot

Intruder alarm server

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users secure access to their organization's network.

Proxy Server

Demilitarised zone

Virtual Private Network

Quarantine Network

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of these firewalls is used to forward each session that an internal user makes to a network resource on the public network based on the application.

Application layer

Intrusion detection

Stateful inspection

Stateless inspection

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks, usually the internet.

MTPOD

VLAN

VPN

DMZ

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.

Trojan Horse

Logic Bomb

Birthday Attack

Worm

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of these attack occurs when a hacker inserts itself between the communications of a client and a server?

Man-in-the-Middle

IP Spoofing

Replay

Social engineering

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?