Network Security 6

Network Security 6

Professional Development

20 Qs

quiz-placeholder

Similar activities

Quiz for Traning

Quiz for Traning

Professional Development

16 Qs

Buster Quiz

Buster Quiz

KG - Professional Development

15 Qs

Certification example test1.

Certification example test1.

Professional Development

20 Qs

Confirmation of Learning 3

Confirmation of Learning 3

Professional Development

20 Qs

Teltonika v2

Teltonika v2

Professional Development

20 Qs

Post-Test Under Cyber Closet Project

Post-Test Under Cyber Closet Project

Professional Development

25 Qs

10-01 day 8

10-01 day 8

Professional Development

19 Qs

Pre-Test Under Cyber Closet Project

Pre-Test Under Cyber Closet Project

Professional Development

25 Qs

Network Security 6

Network Security 6

Assessment

Quiz

Other

Professional Development

Hard

Created by

samuel Ekundare

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is the secure port number for SMTP

21

22

587

25

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

one of the ways you can restrict access to port on a network is through the use of __

Network Access Point

Network Access Correction

Network Access Control

Network Access

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Sync Flood Attack the attacker will continuosly flood the target server with a Sync Ack till the server is overwhelmed

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Smurf Attack is same as Ping flood attack

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ARP is used to determine IP address from a known Mac address

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a Network Access Control?

To restrict access to specific ports

To correct network access issues

To provide network access points

To control network access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Honeynet contains the exact same information as the main network. the only difference is that it is intended to distract the attacker from the main network

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?