Search Header Logo

CASP: Chapter 4(2of2)

Authored by Khairul Imtiyaz

Computers

University

CASP: Chapter 4(2of2)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique involves the logical division of a network into multiple subnetworks and is commonly used for network segmentation?

Virtual LANs (VLANs)

Virtual Private Network (VPN)

Subnetting

Intrusion Detection System (IDS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which segmentation technique utilizes two firewalls, with one placed on the external interface and the other on the internal interface of the DMZ, to control traffic flow between different network segments?

Demilitarized Zone (DMZ)

Virtual LANs (VLANs)

Screened Subnet

Intrusion Prevention System (IPS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which environment is typically utilized as a mirror of the production environment for testing changes to infrastructure, software, and/or data before implementing them in the production environment?

Guest Environments

Sandbox Environments

Development Environments

Staging Environments

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of guest environments within an organization's network infrastructure?

To serve as a testing environment for infrastructure changes

To facilitate communication between internal and external networks

To provide access to production services for visitors

To offer isolated network access to visitors while minimizing potential security risks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which networking concept is closely associated with providing anonymity due to the lack of a central authority and is often used for the distribution of files and anonymous network access?

TOR (The Onion Router)

Peer-to-Peer (P2P) Networks

Jump Box

Air Gap

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of host is not physically connected to any network and is surrounded by a monitored empty area to detect unauthorized attempts to approach the asset?

Peer-to-Peer (P2P) Host

Jump Box

Air Gapped Host

TOR (The Onion Router) Host

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach to network segmentation provides higher levels of security granularity and flexibility by isolating workloads from one another, particularly focusing on limiting 'east-west' traffic flows?

Virtual Private Cloud (VPC)

Microsegmentation

Traditional Network Segmentation

Software-Defined Networks (SDN)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?