SecurityPro Chapter 5 Quiz

SecurityPro Chapter 5 Quiz

12th Grade

15 Qs

quiz-placeholder

Similar activities

WAN Sesi 1

WAN Sesi 1

1st Grade - University

10 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

User Interface Design - Topic 1

User Interface Design - Topic 1

12th Grade

15 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Recap

Recap

12th Grade

10 Qs

Computer Basics 2 - CESA

Computer Basics 2 - CESA

7th Grade - University

10 Qs

UH 1 Teknologi wan

UH 1 Teknologi wan

12th Grade

20 Qs

SecurityPro Chapter 5 Quiz

SecurityPro Chapter 5 Quiz

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Joseph Gilliam

Used 47+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Where should an organization's web server be placed?

DMZ

Honeynet

Extranet

Intranet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a privately controlled portion of a network that is accessible to some specific external entities?

MAN

Extranet

Intranet

Internet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A honeypot is used for which purpose?

To disable an intruder's system

To entrap intruders

To delay intruders in order to gather auditing data

To prevent sensitive data from being accessed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices can apply quality of service and traffic-shaping rules based on what created the network traffic?

Application-aware devices

Proxy server

Network access control

All-in-one security appliances

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to create a collection of computers on your network that appear to have valuable data but actually store fake data that could entice a potential intruder. Which features should you implement?

NIDS

NIPS

Honeynet

Extranet

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which item would provide the BEST security for a small financial credit business that handles personal financial information for clients seeking small loans over the internet?

Network access control system

Proxy server with access controls

All-in-one security appliance

Firewall on your gateway server to the internet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?

Bastion or sacrificial host

Multi-homed

Circuit proxy

Kernel proxy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers