
COM450 CH7 QUIZ
Authored by Katrina Weicht
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
When is a reverse proxy useful?
To grant outside users access to internal email servers
To support internal users accessing the public Internet
To allow internal users to access external web servers
To offer external entities access to an internal web server
Answer explanation
Allows clients to use a single public address to access a cluster of internal web servers
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is an event found in a firewall log file that is a symptom of a rogue host operating within the private network?
Packets from an unassigned internal address
Packets to an unknown port on an internal host
Packets in a serial grouping, attempting to access a series of ports
Packets that are all exactly the same, directed toward a single target
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which security strategy is based on locking the environment down so users can perform their assigned tasks, but little else?
Creating chokepoints
Diversity of defense
Principle of least privilege
Separation of duties
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following statements is true regarding a reverse proxy?
The reverse proxy server can act as the endpoint for a TLS tunnel.
A reverse proxy cannot be used in conjunction with secured websites.
A reverse proxy can be used with tunnel mode IPSec VPNs.
A reverse proxy cannot support simultaneous SSL tunnels.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is the most important feature of a bastion host OS?
Leveraging existing OS administrative knowledge
Inherent ease of use
Resistance to attacks and compromise attempts
Unlimited remote administration
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
When considering deployment of an IDS or IPS, what is the biggest problem?
Failing anomaly detection
False positives
False negatives
Failing to operate at wire speed
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a highly recommended method or technique for keeping firewall logs secure and uncorrupted?
Storing the logs in binary form
Using high-capacity hard drives
Using timestamps
Using WORM drives
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
DGP : Komposisi Fotografi
Quiz
•
University
10 questions
Recursion Practice, Recursion Practice, Recursion Practice...
Quiz
•
10th Grade - University
10 questions
CHAPTER 1: COMPUTER SECURITY REVIEW
Quiz
•
University
10 questions
Listen in Python
Quiz
•
University
13 questions
Chap 1: What is a program made of?
Quiz
•
University
10 questions
Introduction to AI - Healthcare & Business
Quiz
•
University - Professi...
10 questions
Komdat Chap 2
Quiz
•
University
14 questions
LA7.C7: Turtle Graphics
Quiz
•
9th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
5 questions
Examining Theme
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University