SecurityPro Chapter 5 Quiz

SecurityPro Chapter 5 Quiz

12th Grade

15 Qs

quiz-placeholder

Similar activities

Cell Phone Vocabulary

Cell Phone Vocabulary

9th - 12th Grade

12 Qs

Vocabulary of Computer

Vocabulary of Computer

12th Grade

15 Qs

Sprawdź się

Sprawdź się

4th - 12th Grade

10 Qs

Teknik Pengolahan Audio dan Video

Teknik Pengolahan Audio dan Video

12th Grade

20 Qs

HTML

HTML

8th - 12th Grade

15 Qs

Quiz Inf X.B

Quiz Inf X.B

10th Grade - University

20 Qs

CSS - Computer Systems Services

CSS - Computer Systems Services

12th Grade

20 Qs

Intro to Windows Server 2012

Intro to Windows Server 2012

12th Grade

10 Qs

SecurityPro Chapter 5 Quiz

SecurityPro Chapter 5 Quiz

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Joseph Gilliam

Used 47+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Where should an organization's web server be placed?

DMZ

Honeynet

Extranet

Intranet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a privately controlled portion of a network that is accessible to some specific external entities?

MAN

Extranet

Intranet

Internet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A honeypot is used for which purpose?

To disable an intruder's system

To entrap intruders

To delay intruders in order to gather auditing data

To prevent sensitive data from being accessed

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices can apply quality of service and traffic-shaping rules based on what created the network traffic?

Application-aware devices

Proxy server

Network access control

All-in-one security appliances

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to create a collection of computers on your network that appear to have valuable data but actually store fake data that could entice a potential intruder. Which features should you implement?

NIDS

NIPS

Honeynet

Extranet

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which item would provide the BEST security for a small financial credit business that handles personal financial information for clients seeking small loans over the internet?

Network access control system

Proxy server with access controls

All-in-one security appliance

Firewall on your gateway server to the internet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?

Bastion or sacrificial host

Multi-homed

Circuit proxy

Kernel proxy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?