Advanced Network Security

Advanced Network Security

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

LA1.C1: Introduction to Small Basic

LA1.C1: Introduction to Small Basic

9th Grade

15 Qs

12AIT - All About W3C <3

12AIT - All About W3C <3

10th Grade - University

18 Qs

Google Docs Basics Quiz

Google Docs Basics Quiz

9th Grade

20 Qs

Unit 8 Practice Test For CSP

Unit 8 Practice Test For CSP

9th Grade

16 Qs

¿Qué es un sistema operativo?

¿Qué es un sistema operativo?

10th Grade

19 Qs

Aplikasi Perkantoran

Aplikasi Perkantoran

10th Grade

15 Qs

Bài 13 Tin 10

Bài 13 Tin 10

1st - 12th Grade

18 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Advanced Network Security

Advanced Network Security

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Andrea M Day

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does an intrusion prevention system differ from an intrusion detection system?

An IDS discovers and blocks suspicious activity.

An IDS only blocks suspicious activity, but does not analyze it.

An IDS is only available as software, and not a hardware device

An IDS only sends alerts when suspicious behavior is detected.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jonathan just purchased a second server so that he can split tasks between the two servers. What term can be used for this system?

Balancing Server

Client-server Model

Distributed Computing

Load Balancer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would not be considered suspicious behavior by an intrusion detection system (IDS)?

A user tries to access a password file

A large amount of data is sent somewhere outside of the network

An employee is on vacation, but somebody is accessing the network from their account

An employee accesses a file they are authorized to view during business hours

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tati's Internet speed has been slow and she would like to spread the incoming Internet traffic across different servers to speed up her system and avoid a server overload. What device can she use to accomplish this?

Intrusion Detection System

Intrusion Prevention System

Load Balance

Unified Threat Management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are shopping online for a device to help block unwanted Internet traffic. Which device will not accomplish this task?

Firewall

IDS

IPS

UTN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There have been recent security concerns about too many employees entering the building all at once, using one access card. Which of the following access devices could be used to restrict access to a smaller number of employees at one time?

Checkpoint

Mantrap

Perimeter Zone

Tailgate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies uses a person's physical characteristics in order to gain access?

Biometrics

Complex password requirements

Hardware token

Smart Card

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?