Firewall & IDS

Firewall & IDS

University

10 Qs

quiz-placeholder

Similar activities

AB1401 Case Study: Facebook

AB1401 Case Study: Facebook

University

12 Qs

Quiz 1

Quiz 1

University

11 Qs

ZEA_3S_Teknik_2022

ZEA_3S_Teknik_2022

University

9 Qs

Module 1

Module 1

University

12 Qs

III AI

III AI

University

10 Qs

Network Security L1-Introduction

Network Security L1-Introduction

University

14 Qs

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

8th Grade - University

14 Qs

Chapter 1: Introduction to Cyber Security

Chapter 1: Introduction to Cyber Security

University

15 Qs

Firewall & IDS

Firewall & IDS

Assessment

Quiz

Computers

University

Hard

Created by

Wahyu Adi Prabowo

Used 36+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. Which of the following is an advantage of the network host based configuration?

Resistant to ip spoofing

inexpensive

more secure

has user authentification

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

3. Which of the following is a combination of firewalls

Screened firewalls

Router based firewalls

Dual homed firewalls

Bastion host firewalls

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. What type of firewall requires client applications to be authorised to connect

Dual homed

Screened gateway

Stateful packet inspection

Application gateway

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A device that hides its internal IP addresses is called

Dual homed host

Proxy server

Screened host

Bastion firewall

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

IDS is an acronym for

Intrusion-deterrence system

Intrusion-deterrence service

Intrusion-detection system

Intrusion-deterrence service

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Attempting to attract intruders to a system set up to monitor them is called what

Intrusion dettection

Intrusion deflection

Intrusion routing

Intrusion banishment

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A system that is setup for attracting and monitoring intruders is called

Honeypot

Router

Tracert

Host Based

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?