
CASP: Chapter 4 (1of2)
Authored by Khairul Imtiyaz
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which device operates at layer 3 of the OSI model and forwards traffic between subnets based on IP addresses?
Router
Load Balancer
Firewall
Intrusion Detection System (IDS)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which device provides a foundational level of protection for a network by blocking or allowing traffic based on pre-configured rules, but does not inspect high-level protocols such as HTTP?
Router
Intrusion Prevention System (IPS)
Load Balancer
Firewall
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which device is commonly associated with managing web traffic and can be implemented as either a physical appliance or a virtual machine, offering specialized software for configuring traffic management rules?
Load Balancer
Router
Intrusion Detection System (IDS)
Firewall
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a cloud platform like AWS, which component allows private subnets in a Virtual Private Cloud (VPC) to access the Internet while preventing inbound connections from the Internet to instances in the private subnet?
Security Group
Network Load Balancer (NLB)
Network Address Translation (NAT) Gateway
Virtual Private Network (VPN) Gateway
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which email security mechanism involves inspecting all inbound and outbound traffic, scanning for keywords, and utilizing behavioral and heuristic analyses to identify potential threats?
Email Encryption
Email Authentication
Email Archiving
Email Filtering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method of defending against Distributed Denial-of-Service (DDoS) attacks involves reducing the amount of throughput available to the server or service being attacked, thus protecting the network from consuming all available bandwidth?
Cloud Service Providers
Web Application Firewall (WAF)
Blackhole Routing
Rate Limiting
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which approach for defending against Distributed Denial-of-Service (DDoS) attacks involves inspecting traffic for signs of malicious activity, such as CSRF, XSS, and SQL injection, using sophisticated rules designed to identify and prevent these attacks from reaching the target?
Cloud Service Providers
Blackhole Routing
Web Application Firewall (WAF)
DDoS Mitigation Software/Appliance
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Quiz 1a NDJ30103
Quiz
•
University
10 questions
Proxy Server
Quiz
•
University
10 questions
Riesgos informáticos
Quiz
•
University
10 questions
Introduction to Cybersecurity - Test 3
Quiz
•
University
10 questions
Fondos CSS3
Quiz
•
University
10 questions
Round 3 - Emergin
Quiz
•
University
10 questions
Quiz Keamanan Jaringan
Quiz
•
10th Grade - University
15 questions
Introduction to Django Framework Quiz
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade