Chapter 8

Chapter 8

Professional Development

20 Qs

quiz-placeholder

Similar activities

Asset Management

Asset Management

Professional Development

17 Qs

Crisis Prevention Intervention Review

Crisis Prevention Intervention Review

Professional Development

15 Qs

BCS Network Security Test 7

BCS Network Security Test 7

University - Professional Development

20 Qs

HGV Day 4 Review | Domains and DNS

HGV Day 4 Review | Domains and DNS

Professional Development

18 Qs

SC-200 Quiz

SC-200 Quiz

Professional Development

25 Qs

Front Office Management

Front Office Management

Professional Development

15 Qs

RA 11917

RA 11917

Professional Development

25 Qs

AES - Electrical System

AES - Electrical System

KG - Professional Development

15 Qs

Chapter 8

Chapter 8

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Timothy Courson

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Nicole is the security administrator for a large governmental agency. She has implemented port security, restricted network traffic, and installed NIDS, firewalls, and spam filters. She thinks the network is secure period now she wants to focus on endpoint security. What is the most comprehensive plan for her to follow?

Anti malware /virus/ spyware , host based firewall , and MFA

antivirus /spam , host based IDS, 2FA

anti malware /virus , host based ideas , biometric

antivirus /spam , host based IDS , and SSO

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sally's CISO asked her to recommend an intrusion system to recognize intrusions traversing the network and send e-mail alerts to the IT staff when one is detected. What type of intrusion system does the C ISO want

HIDS

NIDS

HIPS

NIPS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Troy must decide about his organization's file integrity monitoring. Stand alone FIM generally means file analysis only. Another option is to integrate it with the host so that Troy can detect threats in other areas, such as system memory or an i/o. for the integration, which of the following does Troy need to use?

HIDS

ADVFIM

NIDS

Change Managment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT department decided to implement a security appliance in front of their web servers to inspect HTTP /HTTPS /SOAP traffic for malicious activity. Which of the following is the best solution to use?

Screened host firewall

Packet filter firewall

DMZ

WAF

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your employees need internal access while traveling to remote locations you need a service that enables them to securely connect back to a private corporate network from a public network to log into a centralized portal. You want the traffic to be encrypted which of the following is the best tool?

Wi-Fi

VPN

RDP

NIC

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT security department was asked with recommending a single security device that can perform various security functions. The security functions include antivirus protection , anti spyware, a firewall, and an intrusion detection and prevention system what device should the IT security department recommend?

Next-generation firewall

Unified threat management system

Quantum proxy

Next-generation intrusion detection and prevention system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT group within your organization wants to filter requests between clients and their servers. they want to place a device in front of the servers that acts as a middleman between the clients and the servers. This device receives the request from the client and forwards the request to the servers. The server will reply to the request by sending the reply to the device; Then the device will forward the reply onward to the clients. What device best meets this description?

Firewall

NIDS

Reverse proxy

Proxy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?