
Advanced Network Security
Authored by Andrea M Day
Computers
9th - 12th Grade
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does an intrusion prevention system differ from an intrusion detection system?
An IDS discovers and blocks suspicious activity.
An IDS only blocks suspicious activity, but does not analyze it.
An IDS is only available as software, and not a hardware device
An IDS only sends alerts when suspicious behavior is detected.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jonathan just purchased a second server so that he can split tasks between the two servers. What term can be used for this system?
Balancing Server
Client-server Model
Distributed Computing
Load Balancer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would not be considered suspicious behavior by an intrusion detection system (IDS)?
A user tries to access a password file
A large amount of data is sent somewhere outside of the network
An employee is on vacation, but somebody is accessing the network from their account
An employee accesses a file they are authorized to view during business hours
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tati's Internet speed has been slow and she would like to spread the incoming Internet traffic across different servers to speed up her system and avoid a server overload. What device can she use to accomplish this?
Intrusion Detection System
Intrusion Prevention System
Load Balance
Unified Threat Management
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are shopping online for a device to help block unwanted Internet traffic. Which device will not accomplish this task?
Firewall
IDS
IPS
UTN
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There have been recent security concerns about too many employees entering the building all at once, using one access card. Which of the following access devices could be used to restrict access to a smaller number of employees at one time?
Checkpoint
Mantrap
Perimeter Zone
Tailgate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technologies uses a person's physical characteristics in order to gain access?
Biometrics
Complex password requirements
Hardware token
Smart Card
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
HTML QUIZ # 3
Quiz
•
10th Grade
16 questions
Digital Icons
Quiz
•
12th Grade - University
21 questions
Visual Basic Assessment
Quiz
•
11th - 12th Grade
16 questions
Pixlr E Review
Quiz
•
10th Grade
20 questions
Teknologi Layanan Jaringan XI TKJ
Quiz
•
11th Grade
16 questions
Acceptable Use Policy
Quiz
•
6th - 9th Grade
19 questions
UNIT 1.2 MEMORY
Quiz
•
10th Grade
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade