CyberSecurity Essentials Module 2

CyberSecurity Essentials Module 2

10th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

4thpd part1 review game

4thpd part1 review game

CSE 362: Introduction to Computer Security Quiz

CSE 362: Introduction to Computer Security Quiz

Cybersecurity Framework

Cybersecurity Framework

Chapter 7 Review

Chapter 7 Review

Firewall and Network Security Quiz

Firewall and Network Security Quiz

Net Sec I Test Review

Net Sec I Test Review

Firewall and Intrusion Detection Systems Quiz

Firewall and Intrusion Detection Systems Quiz

CyberSecurity Essentials Module 2

CyberSecurity Essentials Module 2

Assessment

Quiz

10th - 12th Grade

Practice Problem

Easy

Created by

LaKeisha Carter

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The single pass architecture of the NGFW integrates multiple threat prevention disciplines (IPS, anti-malware, URL filtering, etc.) into a single stream-based engine with a uniform signature format.

True

False

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which application identification technique determines whether the initially detected application protocol is the "real one" or if it is being used as a tunnel to hide the actual application (for example, Tor might run inside HTTPS).

Heuristics

Application signatures

Application protocol detection and decryption

Application protocol decoding

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

On the NGFW, which type of User-ID technique can be configured to probe Microsoft Windows servers for active network sessions of a user?

Internet Probing

Server Probing

Client Probing

Connection Probing

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Content-ID is an Intrusion Prevention feature that protects networks from all types of vulnerability exploits, buffer overflows, DoS attacks, and port scans that lead to the compromise of confidential and sensitive enterprise information.

True

False

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which Content-ID filtering capability controls the transfer of sensitive data patterns such as credit card and social security numbers in application content and attachments?

File transfer function control

File blocking by type

Data filtering

File filtering by size