CompTIA Sec+ Chapter 3, 2nd Attempt Missed

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

12th Grade

23 Qs

quiz-placeholder

Similar activities

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

7th - 12th Grade

20 Qs

IT Essentials Ch 6 Review - Applied Networking

IT Essentials Ch 6 Review - Applied Networking

9th Grade - University

20 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

TLJ (Materi Mikrotik Dasar)KKM70

TLJ (Materi Mikrotik Dasar)KKM70

12th Grade - University

26 Qs

Proxy Quiz

Proxy Quiz

11th - 12th Grade

20 Qs

CompTIA Network+ - Quiz#1

CompTIA Network+ - Quiz#1

5th Grade - University

20 Qs

PEMANTAPAN USP XII SIJA TKJ

PEMANTAPAN USP XII SIJA TKJ

12th Grade

22 Qs

Mikrotik

Mikrotik

12th Grade

18 Qs

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

Assessment

Quiz

Computers

12th Grade

Easy

Created by

blackpanther300 blackpanther300

Used 6+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Chris is preparing to implement an 802.1X-enabled wireless infrastructure. He knows that he wants to use an Extensible Authentication Protocol (EAP)-based protocol that does not require client-side certificates. Which of the following options should he choose?

EAP-MD5

PEAP

LEAP

EAP-TLS

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Mark is responsible for managing his company's load balancer and wants to use a load-balancing scheduling technique that will take into account the current server load and active sessions. Which of the following techniques should he choose?

Source IP hashing

Weighted response time

Least connection

Round robin

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?

DMZ

VLAN

Router

Guest network

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the equivalent of a VLAN from a physical security perspective?

Perimeter security

Partitioning

Security zones

Firewall

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of firewall examines the content and context of each packet it encounters?

Packet filtering firewall

Stateful packet filtering firewall

Application layer firewall

Gateway firewall

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You're designing a new network infrastructure so that your company can allow unauthenticated users connecting from the Internet to access certain areas. Your goal is to protect the internal network while providing access to those areas. You decide to put the web server on a separate subnet open to public contact. What is this subnet called?

Guest network

DMZ

Intranet

VLAN

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Hans is a security administrator for a large company. Users on his network visit a wide range of websites. He is concerned they might get malware from one of these many websites. Which of the following would be his best approach to mitigate this threat?

Implement host-based antivirus.

Blacklist known infected sites.

Set browsers to allow only signed components.

Set browsers to block all active content (ActiveX, JavaScript, etc.).

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?