Search Header Logo

Chapter 8

Authored by Timothy Courson

Professional Development

Professional Development

Used 3+ times

Chapter 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Nicole is the security administrator for a large governmental agency. She has implemented port security, restricted network traffic, and installed NIDS, firewalls, and spam filters. She thinks the network is secure period now she wants to focus on endpoint security. What is the most comprehensive plan for her to follow?

Anti malware /virus/ spyware , host based firewall , and MFA

antivirus /spam , host based IDS, 2FA

anti malware /virus , host based ideas , biometric

antivirus /spam , host based IDS , and SSO

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sally's CISO asked her to recommend an intrusion system to recognize intrusions traversing the network and send e-mail alerts to the IT staff when one is detected. What type of intrusion system does the C ISO want

HIDS

NIDS

HIPS

NIPS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Troy must decide about his organization's file integrity monitoring. Stand alone FIM generally means file analysis only. Another option is to integrate it with the host so that Troy can detect threats in other areas, such as system memory or an i/o. for the integration, which of the following does Troy need to use?

HIDS

ADVFIM

NIDS

Change Managment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT department decided to implement a security appliance in front of their web servers to inspect HTTP /HTTPS /SOAP traffic for malicious activity. Which of the following is the best solution to use?

Screened host firewall

Packet filter firewall

DMZ

WAF

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your employees need internal access while traveling to remote locations you need a service that enables them to securely connect back to a private corporate network from a public network to log into a centralized portal. You want the traffic to be encrypted which of the following is the best tool?

Wi-Fi

VPN

RDP

NIC

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT security department was asked with recommending a single security device that can perform various security functions. The security functions include antivirus protection , anti spyware, a firewall, and an intrusion detection and prevention system what device should the IT security department recommend?

Next-generation firewall

Unified threat management system

Quantum proxy

Next-generation intrusion detection and prevention system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT group within your organization wants to filter requests between clients and their servers. they want to place a device in front of the servers that acts as a middleman between the clients and the servers. This device receives the request from the client and forwards the request to the servers. The server will reply to the request by sending the reply to the device; Then the device will forward the reply onward to the clients. What device best meets this description?

Firewall

NIDS

Reverse proxy

Proxy

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development