nuts

nuts

University

10 Qs

quiz-placeholder

Similar activities

Many vs Much

Many vs Much

1st Grade - Professional Development

10 Qs

Digital Marketing Race

Digital Marketing Race

University

10 Qs

Gas Well Test Analysis

Gas Well Test Analysis

University

10 Qs

Trivia Taklimat MAP UNIMAS Okt 2020/2021 (CALM)

Trivia Taklimat MAP UNIMAS Okt 2020/2021 (CALM)

University

10 Qs

SBITP QUIZZIZ

SBITP QUIZZIZ

University

10 Qs

Marketing Environment

Marketing Environment

University

10 Qs

ICT in Education - Assessment Quiz

ICT in Education - Assessment Quiz

University

10 Qs

Computer Networking

Computer Networking

University

10 Qs

nuts

nuts

Assessment

Quiz

Education

University

Practice Problem

Easy

Created by

Ari Ari

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?

Deploy a Cisco ASA.

Require remote access connections through IPsec VPN.

Deploy a Cisco SSL Appliance.

Use a Syslog server to capture network traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

Frames from PC1 will be forwarded to its destination, and a log entry will be created.

Frames from PC1 will be forwarded to its destination, but a log entry will not be created.

Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.

Frames from PC1 will be dropped, and there will be no log of the violation.

Frames from PC1 will be dropped, and a log message will be created

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security countermeasure is effective for preventing CAM table overflow attacks?

port security

IP source guard

Dynamic ARP Inspection

DHCP snooping

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two examples of DoS attacks? (Choose two.)

buffer overflow

ping of death

SQL injection

port scanning

phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?

a security association

hashing algorithms

a permit access list entry

transform sets

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)

a valid access list

the ISAKMP policy

encryption

the peer

the hash

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?

Traffic that is originating from the public network is usually blocked when traveling to the DMZ network.

Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network

Traffic that is originating from the public network is usually permitted with little or no restriction when traveling to the DMZ network.

Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Education