net+

net+

Professional Development

30 Qs

quiz-placeholder

Similar activities

FFA Trivia

FFA Trivia

KG - Professional Development

25 Qs

PERSONAL DEVELOPMENT-REVIEWER

PERSONAL DEVELOPMENT-REVIEWER

Professional Development

25 Qs

Horses/Horseback Riding

Horses/Horseback Riding

KG - Professional Development

28 Qs

Advanced Teaching Methods

Advanced Teaching Methods

Professional Development

25 Qs

Hydraulic circuits

Hydraulic circuits

Professional Development

25 Qs

Teacher prep: RICA subtest 3

Teacher prep: RICA subtest 3

Professional Development

25 Qs

Classification Review

Classification Review

Professional Development

26 Qs

Part 2 - Health & Safety 25 Questions

Part 2 - Health & Safety 25 Questions

Professional Development

25 Qs

net+

net+

Assessment

Quiz

Education

Professional Development

Medium

Created by

Jose Canales

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following IDS/IPS detection methods allows an administrator to define what normal traffic patterns are supposed to look like?

Signature-based detection

Policy-based detection

Statistical anomaly detection

Non-statistical anomaly detectio

Answer explanation

Non-statistical anomaly detection allows an administrator to define what normal traffic patterns are supposed to look like.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best defines and IPS sensor?

It defines a set of rules dictating which types of traffic are permitted or denied as that traffic enters or exits a firewall interfacce

It secures communication between two sites over an untrusted network.

It sits in-line with traffic being analyzed, can recognize the signature of a well-known attack, and respond appropriately.

It receives a copy of traffic being analyzed, can recognize the signature of a well-known attack, and respond appropriately.

Answer explanation

An intrusion prevention system (IPS) sensor sits in-line with traffic being analyzed, can recognize the signature of a well-known attack, and respond appropriately.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following network appliances acts as a relay for packets traveling between a network's clients and the Internet and is not focused on tunneling?

VPN concentrator

Load balancer

Proxy server

Content switch

Answer explanation

Some clients are configured to forward their packets, which are seemingly destined for the Internet, to a proxy server. This proxy server receives a client's request, and on behalf of that client (The client's proxy) the proxy server sends the request out to the Internet. When a reply is received from the Internet, the proxy server forwards the response to the client.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary benefit of a VPN concentrator?

It allows a server farm to scale.

It hides inside addresses from the public Internet.

It allows traffic to travel securely over an untrusted network (for example, the Internet).

It reduces bandwidth demand on an IP WAN

Answer explanation

A virtual private network (VPN) can allow traffic to flow securely across untrusted network, such as the Internet. This security is made possible by technologies such as encryption and hashing algorithms.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols resolves an IP address of a network device to a corresponding MAC address?

DNS

ARP

ICMP

IGMP

Answer explanation

Address Resolution Protocol (ARP) is a protocol that can resolve an known IP address of a network device to a corresponding media access control (MAC) address.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of route is manually configured in a router's routing table and tells a router where to send traffic destined for a network not in the router's routing table?

Dynamic route

Default static route

Connected route

Redistributed route

Answer explanation

A default static route is a manually configured route, which tells the router to send traffic destined for a network not currently in the routing table out of a specified interface or to a specified IP address (known as a next-hop IP address).

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Routing protocols differ in the amount of time they require to failover from a previously active route to backup route. What is the name for this routing protocol property?

Split horizon

Poison reverse

Time-to-live

convergence

Answer explanation

Convergence is the amount of time required for a routing protocol to failover from a previously active route to a back up route.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?