Networking Unit 11

Networking Unit 11

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Informatika Kelas IX

Informatika Kelas IX

9th - 12th Grade

10 Qs

Google Icons

Google Icons

5th - 12th Grade

13 Qs

Unit 1.3 Wired & Wireless Networks: MCQs 2

Unit 1.3 Wired & Wireless Networks: MCQs 2

7th - 11th Grade

10 Qs

Cloud Computing and Storage

Cloud Computing and Storage

9th - 10th Grade

10 Qs

CCNA Module 6

CCNA Module 6

12th Grade

15 Qs

Cisco Level 3 Modules 4 - 6

Cisco Level 3 Modules 4 - 6

12th Grade

15 Qs

Cengage 12.1 Cloud

Cengage 12.1 Cloud

10th Grade

15 Qs

011_Technical Change Management-CompTIA Security+ SY0-701-1.3

011_Technical Change Management-CompTIA Security+ SY0-701-1.3

12th Grade - University

15 Qs

Networking Unit 11

Networking Unit 11

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

WILLIAM BELIVEAU

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At what layer of the OSI model do proxy servers operate?

a. Layer 3

b. Layer 4

c. Layer 2

d. Layer 7

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

a. access-list acl_2 permit icmp any any

b. access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www

c. access-list acl_2 permit https any any

d. access-list acl_2 deny tcp any any

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?

a. Destination IP address

b. SYN flags

c. ICMP message

d. Application data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What information in a transmitted message might an IDS use to identify network threats?

a. FIM

b. ACL

c. Port mirroring

d. Signature

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?

a. Shared responsibility model

b. Principle of least privilege

c. Separation of duties

d. Defense in depth

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is responsible for the security of hardware on which a public cloud runs?

a. It depends

b. The cloud customer

c. The cloud provider

d. Both the cloud customer and the cloud provider

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the AAA services provided by RADIUS and TACACS+?

a. Authorization

b. Administration

c. Authentication

d. Accounting

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?