Advanced Network Security

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Andrea M Day
Used 12+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does an intrusion prevention system differ from an intrusion detection system?
An IDS discovers and blocks suspicious activity.
An IDS only blocks suspicious activity, but does not analyze it.
An IDS is only available as software, and not a hardware device
An IDS only sends alerts when suspicious behavior is detected.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jonathan just purchased a second server so that he can split tasks between the two servers. What term can be used for this system?
Balancing Server
Client-server Model
Distributed Computing
Load Balancer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would not be considered suspicious behavior by an intrusion detection system (IDS)?
A user tries to access a password file
A large amount of data is sent somewhere outside of the network
An employee is on vacation, but somebody is accessing the network from their account
An employee accesses a file they are authorized to view during business hours
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tati's Internet speed has been slow and she would like to spread the incoming Internet traffic across different servers to speed up her system and avoid a server overload. What device can she use to accomplish this?
Intrusion Detection System
Intrusion Prevention System
Load Balance
Unified Threat Management
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are shopping online for a device to help block unwanted Internet traffic. Which device will not accomplish this task?
Firewall
IDS
IPS
UTN
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There have been recent security concerns about too many employees entering the building all at once, using one access card. Which of the following access devices could be used to restrict access to a smaller number of employees at one time?
Checkpoint
Mantrap
Perimeter Zone
Tailgate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technologies uses a person's physical characteristics in order to gain access?
Biometrics
Complex password requirements
Hardware token
Smart Card
Create a free account and access millions of resources
Similar Resources on Wayground
22 questions
GCSE Protocols

Quiz
•
9th - 11th Grade
20 questions
Pre test Keamanan Jaringan Pertemuan 2

Quiz
•
11th Grade
18 questions
WJEC ICT - Chapter 2 - The Internet: Network Hardware

Quiz
•
10th Grade - University
18 questions
Cyber EOP - MAC Address By Mr. B

Quiz
•
12th Grade - University
17 questions
Network topology, protocols and layers

Quiz
•
10th Grade
25 questions
Cybersecurity Foundations Introduction

Quiz
•
12th Grade
16 questions
Networking Concepts Quiz

Quiz
•
9th - 12th Grade
17 questions
A+ - 6B - Compare Internet and Embedded Appliances

Quiz
•
12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
Discover more resources for Computers
50 questions
Trivia 7/25

Quiz
•
12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
6 questions
RL.10.1 Cite Evidence

Quiz
•
10th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
14 questions
Algebra 1 SOL Review #1

Quiz
•
9th Grade