Search Header Logo

CASP: Chapter 4 (1of2)

Authored by Khairul Imtiyaz

Computers

University

Used 1+ times

CASP: Chapter 4 (1of2)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device operates at layer 3 of the OSI model and forwards traffic between subnets based on IP addresses?

Router

Load Balancer

Firewall

Intrusion Detection System (IDS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device provides a foundational level of protection for a network by blocking or allowing traffic based on pre-configured rules, but does not inspect high-level protocols such as HTTP?

Router

Intrusion Prevention System (IPS)

Load Balancer

Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device is commonly associated with managing web traffic and can be implemented as either a physical appliance or a virtual machine, offering specialized software for configuring traffic management rules?

Load Balancer

Router

Intrusion Detection System (IDS)

Firewall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a cloud platform like AWS, which component allows private subnets in a Virtual Private Cloud (VPC) to access the Internet while preventing inbound connections from the Internet to instances in the private subnet?

Security Group

Network Load Balancer (NLB)

Network Address Translation (NAT) Gateway

Virtual Private Network (VPN) Gateway

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which email security mechanism involves inspecting all inbound and outbound traffic, scanning for keywords, and utilizing behavioral and heuristic analyses to identify potential threats?

Email Encryption

Email Authentication

Email Archiving

Email Filtering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of defending against Distributed Denial-of-Service (DDoS) attacks involves reducing the amount of throughput available to the server or service being attacked, thus protecting the network from consuming all available bandwidth?

Cloud Service Providers

Web Application Firewall (WAF)

Blackhole Routing

Rate Limiting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach for defending against Distributed Denial-of-Service (DDoS) attacks involves inspecting traffic for signs of malicious activity, such as CSRF, XSS, and SQL injection, using sophisticated rules designed to identify and prevent these attacks from reaching the target?

Cloud Service Providers

Blackhole Routing

Web Application Firewall (WAF)

DDoS Mitigation Software/Appliance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers