Advanced Network Security

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Andrea M Day
Used 12+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does an intrusion prevention system differ from an intrusion detection system?
An IDS discovers and blocks suspicious activity.
An IDS only blocks suspicious activity, but does not analyze it.
An IDS is only available as software, and not a hardware device
An IDS only sends alerts when suspicious behavior is detected.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jonathan just purchased a second server so that he can split tasks between the two servers. What term can be used for this system?
Balancing Server
Client-server Model
Distributed Computing
Load Balancer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would not be considered suspicious behavior by an intrusion detection system (IDS)?
A user tries to access a password file
A large amount of data is sent somewhere outside of the network
An employee is on vacation, but somebody is accessing the network from their account
An employee accesses a file they are authorized to view during business hours
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tati's Internet speed has been slow and she would like to spread the incoming Internet traffic across different servers to speed up her system and avoid a server overload. What device can she use to accomplish this?
Intrusion Detection System
Intrusion Prevention System
Load Balance
Unified Threat Management
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are shopping online for a device to help block unwanted Internet traffic. Which device will not accomplish this task?
Firewall
IDS
IPS
UTN
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There have been recent security concerns about too many employees entering the building all at once, using one access card. Which of the following access devices could be used to restrict access to a smaller number of employees at one time?
Checkpoint
Mantrap
Perimeter Zone
Tailgate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technologies uses a person's physical characteristics in order to gain access?
Biometrics
Complex password requirements
Hardware token
Smart Card
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Pre-Assessment on CH4 Networks

Quiz
•
9th - 10th Grade
15 questions
Network Hardware

Quiz
•
8th - 11th Grade
20 questions
Intro Cyber U7 Review Switching & Routing

Quiz
•
12th Grade
20 questions
Computer Networks

Quiz
•
12th Grade
20 questions
Computer Security Measures

Quiz
•
11th Grade - University
25 questions
Networking Ch 6 - Firewalls

Quiz
•
9th - 12th Grade
18 questions
End of unit assessment - Networks

Quiz
•
9th Grade
20 questions
Module 11- Switch Security Configuration

Quiz
•
11th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
1.2 OSI & TCP IP Models Quiz

Quiz
•
10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
30 questions
Introduction to Computers

Quiz
•
8th - 9th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade