Module 6 Network security Devices, Design, and Technology

Module 6 Network security Devices, Design, and Technology

11th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

ETECH Lesson 1 QUIZ

ETECH Lesson 1 QUIZ

11th Grade

10 Qs

Instalación de Redes

Instalación de Redes

11th Grade

10 Qs

Primer Año

Primer Año

11th Grade

10 Qs

xxxIELTS Foundation 2nd Ed p. 79 Lexis

xxxIELTS Foundation 2nd Ed p. 79 Lexis

12th Grade - Professional Development

12 Qs

Premiere Pro Video Project Organization

Premiere Pro Video Project Organization

9th - 12th Grade

10 Qs

模擬試題

模擬試題

10th - 11th Grade

9 Qs

Mit App Inventor

Mit App Inventor

11th Grade

12 Qs

Ulhar_KKT_Bu Kurnia

Ulhar_KKT_Bu Kurnia

12th Grade

10 Qs

Module 6 Network security Devices, Design, and Technology

Module 6 Network security Devices, Design, and Technology

Assessment

Quiz

Instructional Technology

11th - 12th Grade

Hard

Created by

James Trower

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which device is easiest for an attacker to take advantage of to capture and analyze packets?

Router

WIFI Access Point

Switch

Load Balancer

2.

MULTIPLE CHOICE QUESTION

2 mins • 9 pts

Which device watches for attacks and sounds an alert only when one occurs?

firewall

network intrusion detection system (NIDS)

network intrusion prevention system (NIPS)

proxy intrusion device

3.

MULTIPLE CHOICE QUESTION

2 mins • 20 pts

Which of these would NOT be a filtering mechanism found in a firewall ACL rule?

source address

direction

date

protocol

4.

MULTIPLE CHOICE QUESTION

2 mins • 10 pts

Which of the following devices can identify the application that sent packets and then make decisions about filtering based on it?

Internet content filter

application-based firewall

reverse proxy

web security gateway

5.

MULTIPLE CHOICE QUESTION

2 mins • 10 pts

Which function does an Internet content filter NOT perform?

intrusion detection

URL filtering

malware inspection

content inspection

6.

MULTIPLE CHOICE QUESTION

2 mins • 10 pts

Frank was asked to explain the danger of a MAC flooding attack on a switch.  What might Frank say?

Once the MAC address table is full the switch functions like a network hub.

A MAC flooding attack with filter to the local host computer’s MAC-to-IP address tables and prevent these hosts from reaching the network.

In a defense of a MAC flooding attack network routers will freeze and not permit any incoming traffic.

A MAC flooding attack will prevent load balances from identifying the correct VIP of the servers.

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which device is easiest for an attacker to take advantage of to capture and analyze packets?

Router

WIFI Access Point

Switch

Load Balancer

8.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which is the most secure type of firewall?

stateless packet filtering

stateful packet filtering

network intrusion detection system replay

reverse proxy analysis

Discover more resources for Instructional Technology