
CASP: Chapter 4(2of2)
Authored by Khairul Imtiyaz
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technique involves the logical division of a network into multiple subnetworks and is commonly used for network segmentation?
Virtual LANs (VLANs)
Virtual Private Network (VPN)
Subnetting
Intrusion Detection System (IDS)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which segmentation technique utilizes two firewalls, with one placed on the external interface and the other on the internal interface of the DMZ, to control traffic flow between different network segments?
Demilitarized Zone (DMZ)
Virtual LANs (VLANs)
Screened Subnet
Intrusion Prevention System (IPS)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which environment is typically utilized as a mirror of the production environment for testing changes to infrastructure, software, and/or data before implementing them in the production environment?
Guest Environments
Sandbox Environments
Development Environments
Staging Environments
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of guest environments within an organization's network infrastructure?
To serve as a testing environment for infrastructure changes
To facilitate communication between internal and external networks
To provide access to production services for visitors
To offer isolated network access to visitors while minimizing potential security risks
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which networking concept is closely associated with providing anonymity due to the lack of a central authority and is often used for the distribution of files and anonymous network access?
TOR (The Onion Router)
Peer-to-Peer (P2P) Networks
Jump Box
Air Gap
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of host is not physically connected to any network and is surrounded by a monitored empty area to detect unauthorized attempts to approach the asset?
Peer-to-Peer (P2P) Host
Jump Box
Air Gapped Host
TOR (The Onion Router) Host
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which approach to network segmentation provides higher levels of security granularity and flexibility by isolating workloads from one another, particularly focusing on limiting 'east-west' traffic flows?
Virtual Private Cloud (VPC)
Microsegmentation
Traditional Network Segmentation
Software-Defined Networks (SDN)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
11 questions
Latex
Quiz
•
University
15 questions
untitled
Quiz
•
11th Grade - University
13 questions
Processing Quiz
Quiz
•
University
10 questions
Android
Quiz
•
University
13 questions
BACS3323 Chapter 4 -Flocking Algorithm
Quiz
•
University
15 questions
COMPUTER NETWORK & SECURITY (QUIZ #4) MIDTERM 2024
Quiz
•
University
13 questions
CSC 2663 - Database administrative Functions
Quiz
•
University
10 questions
Tes Awal Modul 5 CC
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade