
Firewall & IDS
Authored by Wahyu Adi Prabowo
Computers
University
Used 38+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
2. Which of the following is an advantage of the network host based configuration?
Resistant to ip spoofing
inexpensive
more secure
has user authentification
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
3. Which of the following is a combination of firewalls
Screened firewalls
Router based firewalls
Dual homed firewalls
Bastion host firewalls
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
4. What type of firewall requires client applications to be authorised to connect
Dual homed
Screened gateway
Stateful packet inspection
Application gateway
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A device that hides its internal IP addresses is called
Dual homed host
Proxy server
Screened host
Bastion firewall
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
IDS is an acronym for
Intrusion-deterrence system
Intrusion-deterrence service
Intrusion-detection system
Intrusion-deterrence service
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Attempting to attract intruders to a system set up to monitor them is called what
Intrusion dettection
Intrusion deflection
Intrusion routing
Intrusion banishment
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A system that is setup for attracting and monitoring intruders is called
Honeypot
Router
Tracert
Host Based
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?