Search Header Logo

Module 6 Network security Devices, Design, and Technology

Authored by James Trower

Instructional Technology

11th - 12th Grade

Used 1+ times

Module 6 Network security Devices, Design, and Technology
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which device is easiest for an attacker to take advantage of to capture and analyze packets?

Router

WIFI Access Point

Switch

Load Balancer

2.

MULTIPLE CHOICE QUESTION

2 mins • 9 pts

Which device watches for attacks and sounds an alert only when one occurs?

firewall

network intrusion detection system (NIDS)

network intrusion prevention system (NIPS)

proxy intrusion device

3.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Which of these would NOT be a filtering mechanism found in a firewall ACL rule?

source address

direction

date

protocol

4.

MULTIPLE CHOICE QUESTION

2 mins • 10 pts

Which of the following devices can identify the application that sent packets and then make decisions about filtering based on it?

Internet content filter

application-based firewall

reverse proxy

web security gateway

5.

MULTIPLE CHOICE QUESTION

2 mins • 10 pts

Which function does an Internet content filter NOT perform?

intrusion detection

URL filtering

malware inspection

content inspection

6.

MULTIPLE CHOICE QUESTION

2 mins • 10 pts

Frank was asked to explain the danger of a MAC flooding attack on a switch.  What might Frank say?

Once the MAC address table is full the switch functions like a network hub.

A MAC flooding attack with filter to the local host computer’s MAC-to-IP address tables and prevent these hosts from reaching the network.

In a defense of a MAC flooding attack network routers will freeze and not permit any incoming traffic.

A MAC flooding attack will prevent load balances from identifying the correct VIP of the servers.

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which device is easiest for an attacker to take advantage of to capture and analyze packets?

Router

WIFI Access Point

Switch

Load Balancer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?