CyberSecurity Foundations Unit 7

CyberSecurity Foundations Unit 7

10th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

Principles of IT Vocabulary A-J

Principles of IT Vocabulary A-J

7th Grade - University

10 Qs

Edexcel GCSE Computer Science: Topic 4: Networks

Edexcel GCSE Computer Science: Topic 4: Networks

12th Grade

10 Qs

Computer Networking Concepts Quiz

Computer Networking Concepts Quiz

12th Grade

10 Qs

Understanding Firewalls and Network Security

Understanding Firewalls and Network Security

11th Grade

10 Qs

Network Concepts Quiz

Network Concepts Quiz

9th - 12th Grade

10 Qs

Securing Windows

Securing Windows

9th Grade - University

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

10 Qs

CyberSecurity Foundations Unit 7

CyberSecurity Foundations Unit 7

Assessment

Quiz

10th - 12th Grade

Medium

Created by

LaKeisha Carter

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Characteristics of unified threat management (UTM) include all of the following except:

Enabling all of the security functions in a UTM device can have a significant performance impact.

Combines security functions such as firewalls, intrusion detection systems (IDS), anti-malware, and data loss prevention (DLP) in a single appliance.

UTM can be a convenient solution for small networks.

UTM fully integrates all of the security functions installed on the device.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which VPN technology is currently considered the preferred method for securely connecting a remote endpoint device back to an enterprise network?

Secure Socket Layer (SSL)

Internet Protocol Security (IPSEC)

Secure Socket tunneling protocol (SSTP)

Point-to-point Tunneling protocol (PPTP)

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are typical mobile device management software capabilities? Select all that apply.

Personal Firewalls

Policy Enforcement

Malware Prevention

Data Loss Prevention

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Packet-Filtering Firewalls operate at Layer 3 (network layer) of the Open Systems Interconnection (OSI) reference model.

True

False

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Characteristics of application firewalls include all of the following except:

Proxies traffic rather than permitting direct communication between hosts

Can be used to implement strong user authentication

Is extremely fast and has no impact on network performance

Masks the internal network from untrusted networks