Firewall & IDS

Firewall & IDS

University

10 Qs

quiz-placeholder

Similar activities

ZEA_3S_Teknik_2022

ZEA_3S_Teknik_2022

University

9 Qs

Proxy Server

Proxy Server

University

10 Qs

uas-siber

uas-siber

University

10 Qs

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

8th Grade - University

14 Qs

Defense in Depth Quiz

Defense in Depth Quiz

University

10 Qs

J277 - 1.4 - Firewalls and Proxy Servers

J277 - 1.4 - Firewalls and Proxy Servers

10th Grade - University

8 Qs

COMPUTER NETWORK & SECURITY (QUIZ #4) MIDTERM 2024

COMPUTER NETWORK & SECURITY (QUIZ #4) MIDTERM 2024

University

15 Qs

Free Test  MAPEL AIJ (Fire Wall) Pertemuan 1

Free Test MAPEL AIJ (Fire Wall) Pertemuan 1

University

15 Qs

Firewall & IDS

Firewall & IDS

Assessment

Quiz

Computers

University

Hard

Created by

Wahyu Adi Prabowo

Used 36+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. Which of the following is an advantage of the network host based configuration?

Resistant to ip spoofing

inexpensive

more secure

has user authentification

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

3. Which of the following is a combination of firewalls

Screened firewalls

Router based firewalls

Dual homed firewalls

Bastion host firewalls

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. What type of firewall requires client applications to be authorised to connect

Dual homed

Screened gateway

Stateful packet inspection

Application gateway

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A device that hides its internal IP addresses is called

Dual homed host

Proxy server

Screened host

Bastion firewall

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

IDS is an acronym for

Intrusion-deterrence system

Intrusion-deterrence service

Intrusion-detection system

Intrusion-deterrence service

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Attempting to attract intruders to a system set up to monitor them is called what

Intrusion dettection

Intrusion deflection

Intrusion routing

Intrusion banishment

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A system that is setup for attracting and monitoring intruders is called

Honeypot

Router

Tracert

Host Based

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?