Search Header Logo

Advanced Network Security

Authored by Andrea M Day

Computers

9th - 12th Grade

Used 14+ times

Advanced Network Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does an intrusion prevention system differ from an intrusion detection system?

An IDS discovers and blocks suspicious activity.

An IDS only blocks suspicious activity, but does not analyze it.

An IDS is only available as software, and not a hardware device

An IDS only sends alerts when suspicious behavior is detected.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jonathan just purchased a second server so that he can split tasks between the two servers. What term can be used for this system?

Balancing Server

Client-server Model

Distributed Computing

Load Balancer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would not be considered suspicious behavior by an intrusion detection system (IDS)?

A user tries to access a password file

A large amount of data is sent somewhere outside of the network

An employee is on vacation, but somebody is accessing the network from their account

An employee accesses a file they are authorized to view during business hours

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tati's Internet speed has been slow and she would like to spread the incoming Internet traffic across different servers to speed up her system and avoid a server overload. What device can she use to accomplish this?

Intrusion Detection System

Intrusion Prevention System

Load Balance

Unified Threat Management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are shopping online for a device to help block unwanted Internet traffic. Which device will not accomplish this task?

Firewall

IDS

IPS

UTN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There have been recent security concerns about too many employees entering the building all at once, using one access card. Which of the following access devices could be used to restrict access to a smaller number of employees at one time?

Checkpoint

Mantrap

Perimeter Zone

Tailgate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies uses a person's physical characteristics in order to gain access?

Biometrics

Complex password requirements

Hardware token

Smart Card

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?