BCS Network Security Test 1

BCS Network Security Test 1

University - Professional Development

20 Qs

quiz-placeholder

Similar activities

CPA 3NT Paper 1 Quiz 6 (Ping Yi Sec)

CPA 3NT Paper 1 Quiz 6 (Ping Yi Sec)

10th - 12th Grade

20 Qs

Practicando para el examen de Personal Social

Practicando para el examen de Personal Social

1st - 5th Grade

19 Qs

UTBK TPS 2

UTBK TPS 2

12th Grade

20 Qs

Línea del tiempo

Línea del tiempo

7th - 8th Grade

17 Qs

Comunicación Verbal

Comunicación Verbal

KG

15 Qs

Digital learning and Teams - etiquette & protocols

Digital learning and Teams - etiquette & protocols

8th - 12th Grade

16 Qs

What do you know about cults?

What do you know about cults?

11th Grade

17 Qs

taryfy hotelowe, 6.10

taryfy hotelowe, 6.10

3rd Grade

20 Qs

BCS Network Security Test 1

BCS Network Security Test 1

Assessment

Quiz

Instructional Technology, Education, Professional Development

University - Professional Development

Practice Problem

Easy

Created by

Chris Whitehead

Used 363+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A network firewall that tracks the operating state and characteristics of network connections traversing it.

Stateful

Stateless

Honeypot

Fly trap

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems.

intrusion detection system

Fly trap

Honeypot

Intruder alarm server

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users secure access to their organization's network.

Proxy Server

Demilitarised zone

Virtual Private Network

Quarantine Network

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of these firewalls is used to forward each session that an internal user makes to a network resource on the public network based on the application.

Application layer

Intrusion detection

Stateful inspection

Stateless inspection

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks, usually the internet.

MTPOD

VLAN

VPN

DMZ

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.

Trojan Horse

Logic Bomb

Birthday Attack

Worm

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of these attack occurs when a hacker inserts itself between the communications of a client and a server?

Man-in-the-Middle

IP Spoofing

Replay

Social engineering

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?