MTA Security Fundamentals Lesson 4

MTA Security Fundamentals Lesson 4

10th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Naruto Knowledge  (Shippuden)  Part 1

Naruto Knowledge (Shippuden) Part 1

3rd Grade - University

10 Qs

Fashion Accessory

Fashion Accessory

10th Grade

10 Qs

And Then There Were None Chapters 1-4 Vocabulary

And Then There Were None Chapters 1-4 Vocabulary

7th - 10th Grade

10 Qs

Safety Rules

Safety Rules

9th - 12th Grade

10 Qs

Food labels

Food labels

9th - 11th Grade

15 Qs

Waterfowl, Migratory and Upland Game Bird I.D.

Waterfowl, Migratory and Upland Game Bird I.D.

9th - 12th Grade

13 Qs

FUNDAMENTAL DUTIES

FUNDAMENTAL DUTIES

7th - 10th Grade

11 Qs

COVID-19

COVID-19

5th - 12th Grade

10 Qs

MTA Security Fundamentals Lesson 4

MTA Security Fundamentals Lesson 4

Assessment

Quiz

Life Skills

10th - 12th Grade

Hard

Created by

Quintasia Hurt

Used 43+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following should be considered when deciding whether to use a software or hardware firewall?

Host operating system

application conflicts

operating system version

firewall service efficiency

stability

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are layers of the OSI model?

Physical

Control

Application

Network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Routing occurs at which layer of the OSI model?

Physical

Data-Link

Transport

Session

Network

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are valid firewall types?

Virtual

Network

Packet filtering

IPsec

Application

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are typically examined by a stateful inspection firewall?

IP address of the sending host

IP address of the receiving host

IP address of the router

Data packet type

Data packet size

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an attack that relies on having a user execute a malicious script embedded in a web page?

man-in-the-middle

brute force

cross-site scripting

SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small business owner has purchased a new wireless access point and wants to ensure that only his systems are able to connect to the wireless. He enables MAC address filtering and puts the MAC addresses for all his computers in the permitted table.

This filtering occurs at which layer of the OSI model?

Physical layer

Data-link layer

Network layer

Transport layer

Session layer

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?