Firewall & IDS

Firewall & IDS

University

10 Qs

quiz-placeholder

Similar activities

L1 - Computer Networks

L1 - Computer Networks

University

13 Qs

Pre Test ITN

Pre Test ITN

University

10 Qs

Kurose  Redes Cap4

Kurose Redes Cap4

University

12 Qs

7333-Redes e Comunicação de Dados

7333-Redes e Comunicação de Dados

University

15 Qs

AWS S3 Quiz

AWS S3 Quiz

University

10 Qs

Computer Networking

Computer Networking

University

13 Qs

Types of Computer Virus

Types of Computer Virus

University

10 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

Firewall & IDS

Firewall & IDS

Assessment

Quiz

Computers

University

Hard

Created by

Wahyu Adi Prabowo

Used 36+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. Which of the following is an advantage of the network host based configuration?

Resistant to ip spoofing

inexpensive

more secure

has user authentification

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

3. Which of the following is a combination of firewalls

Screened firewalls

Router based firewalls

Dual homed firewalls

Bastion host firewalls

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. What type of firewall requires client applications to be authorised to connect

Dual homed

Screened gateway

Stateful packet inspection

Application gateway

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A device that hides its internal IP addresses is called

Dual homed host

Proxy server

Screened host

Bastion firewall

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

IDS is an acronym for

Intrusion-deterrence system

Intrusion-deterrence service

Intrusion-detection system

Intrusion-deterrence service

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Attempting to attract intruders to a system set up to monitor them is called what

Intrusion dettection

Intrusion deflection

Intrusion routing

Intrusion banishment

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A system that is setup for attracting and monitoring intruders is called

Honeypot

Router

Tracert

Host Based

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?