Firewall & IDS

Firewall & IDS

University

10 Qs

quiz-placeholder

Similar activities

Computer and Network Security

Computer and Network Security

University

10 Qs

uas-siber

uas-siber

University

10 Qs

E. Diagnóstica

E. Diagnóstica

University

10 Qs

TKJ

TKJ

12th Grade - University

15 Qs

Jaringan Komputer II SSM

Jaringan Komputer II SSM

University

10 Qs

VLSM

VLSM

University

10 Qs

XIITKJ-2

XIITKJ-2

12th Grade - University

15 Qs

Fundamental Connectivity for AM online Class

Fundamental Connectivity for AM online Class

University - Professional Development

15 Qs

Firewall & IDS

Firewall & IDS

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Wahyu Adi Prabowo

Used 36+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. Which of the following is an advantage of the network host based configuration?

Resistant to ip spoofing

inexpensive

more secure

has user authentification

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

3. Which of the following is a combination of firewalls

Screened firewalls

Router based firewalls

Dual homed firewalls

Bastion host firewalls

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. What type of firewall requires client applications to be authorised to connect

Dual homed

Screened gateway

Stateful packet inspection

Application gateway

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A device that hides its internal IP addresses is called

Dual homed host

Proxy server

Screened host

Bastion firewall

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

IDS is an acronym for

Intrusion-deterrence system

Intrusion-deterrence service

Intrusion-detection system

Intrusion-deterrence service

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Attempting to attract intruders to a system set up to monitor them is called what

Intrusion dettection

Intrusion deflection

Intrusion routing

Intrusion banishment

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A system that is setup for attracting and monitoring intruders is called

Honeypot

Router

Tracert

Host Based

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers