CASP: Chapter 4 (1of2)

CASP: Chapter 4 (1of2)

University

10 Qs

quiz-placeholder

Similar activities

THEORY TEST DFN5023-CLO1 JUN2020

THEORY TEST DFN5023-CLO1 JUN2020

University

12 Qs

Security Devices

Security Devices

10th Grade - University

7 Qs

KEAMANAN KOMPUTER

KEAMANAN KOMPUTER

University

15 Qs

Round 1 - TechLingo

Round 1 - TechLingo

University

11 Qs

Kuis Koordinasi TIK 2022

Kuis Koordinasi TIK 2022

University

10 Qs

System Admin

System Admin

University

15 Qs

HTTP - P2

HTTP - P2

University

10 Qs

CompTIA Chapter 3

CompTIA Chapter 3

University

15 Qs

CASP: Chapter 4 (1of2)

CASP: Chapter 4 (1of2)

Assessment

Quiz

Computers

University

Medium

Created by

Khairul Imtiyaz

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device operates at layer 3 of the OSI model and forwards traffic between subnets based on IP addresses?

Router

Load Balancer

Firewall

Intrusion Detection System (IDS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device provides a foundational level of protection for a network by blocking or allowing traffic based on pre-configured rules, but does not inspect high-level protocols such as HTTP?

Router

Intrusion Prevention System (IPS)

Load Balancer

Firewall

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device is commonly associated with managing web traffic and can be implemented as either a physical appliance or a virtual machine, offering specialized software for configuring traffic management rules?

Load Balancer

Router

Intrusion Detection System (IDS)

Firewall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a cloud platform like AWS, which component allows private subnets in a Virtual Private Cloud (VPC) to access the Internet while preventing inbound connections from the Internet to instances in the private subnet?

Security Group

Network Load Balancer (NLB)

Network Address Translation (NAT) Gateway

Virtual Private Network (VPN) Gateway

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which email security mechanism involves inspecting all inbound and outbound traffic, scanning for keywords, and utilizing behavioral and heuristic analyses to identify potential threats?

Email Encryption

Email Authentication

Email Archiving

Email Filtering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of defending against Distributed Denial-of-Service (DDoS) attacks involves reducing the amount of throughput available to the server or service being attacked, thus protecting the network from consuming all available bandwidth?

Cloud Service Providers

Web Application Firewall (WAF)

Blackhole Routing

Rate Limiting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach for defending against Distributed Denial-of-Service (DDoS) attacks involves inspecting traffic for signs of malicious activity, such as CSRF, XSS, and SQL injection, using sophisticated rules designed to identify and prevent these attacks from reaching the target?

Cloud Service Providers

Blackhole Routing

Web Application Firewall (WAF)

DDoS Mitigation Software/Appliance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?