4thpd part1 review game

4thpd part1 review game

Assessment

Assessment

Created by

Donna Applewhite

Other

9th - 12th Grade

1 plays

Easy

Student preview

quiz-placeholder

25 questions

Show all answers

1.

MULTIPLE CHOICE

30 sec • 1 pt

Hackers of limited skill who use expertly written software to attack a system are known as which of the following?

2.

MULTIPLE CHOICE

30 sec • 1 pt

Which option is an example of a logical address?

3.

MULTIPLE CHOICE

30 sec • 1 pt

The method by which systems determine whether and how to admit a user into a trusted area of the organization is known as what?

4.

MULTIPLE CHOICE

30 sec • 1 pt

The Traps agent injects itself into each process as it is started and automatically blocks advanced attacks that would otherwise evade detection.

5.

MULTIPLE CHOICE

30 sec • 1 pt

On the NGFW, which type of User-ID technique can be configured to probe Microsoft Windows servers for active network sessions of a user?

6.

MULTIPLE CHOICE

30 sec • 1 pt

Which option is NOT a core technique for identifying applications in Palo Alto Networks NGFWs?

7.

MULTIPLE CHOICE

30 sec • 1 pt

Perimeter firewalls are designed to protect against what type of traffic?

8.

MULTIPLE CHOICE

30 sec • 1 pt

The process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing false positives and false negatives is known as which of the following?

9.

MULTIPLE CHOICE

30 sec • 1 pt

Which of the following is an event that triggers alarms when no actual attacks are in progress?

10.

MULTIPLE CHOICE

30 sec • 1 pt

Which IPsec protocol secures communication with encryption?

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?