
Security Foundations DXD Day 4 Review
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_______is an investigation and assessment of the impact that various attacks can have on the organization.
BIA
DR
AIB
BDR
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The firewall type that examines the header information of data packets that come into a network and typically functions at the IP/Network level is called.................................
Packet filtering firewall
Session firewall
Application firewall
Nat firewall
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What attack is frequently used as part of a pharming attack to redirect users to malicious site.
DNS Poisoning
CAM Poisoning
Social Engineering
Deep Linking
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A protocol that maps multiple private internal IP addresses to a single public external IP address.
NAP
NAC
NAT
TAN
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is defined as a product’s life span between failures, and is important in the decision-making process of the end user?
MTBF
MTTR
MTTF
FIT
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following countermeasures can mitigate ARP spoofing attacks? (Select two BEST answers)
Port security
DHCP snooping
IP source guard
Dynamic ARP inspection
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A person attempts to access a server during a zone transfer to get access to a zone file. What type of server are they trying to manipulate?
Proxy server
DNS server
File server
Web server
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?