nuts

nuts

University

10 Qs

quiz-placeholder

Similar activities

BCS Systems & Architecture Raymond's Quiz

BCS Systems & Architecture Raymond's Quiz

University - Professional Development

15 Qs

Project Management Network diagram Quiz (Knowledgehut.com blog)

Project Management Network diagram Quiz (Knowledgehut.com blog)

University

15 Qs

Checkpoint 2 Review - 12 A

Checkpoint 2 Review - 12 A

12th Grade - University

10 Qs

Korea Quest: South Korea's History and Cultures

Korea Quest: South Korea's History and Cultures

University

15 Qs

System Administration IV

System Administration IV

University

10 Qs

quiz 1

quiz 1

University

6 Qs

Networks

Networks

University

14 Qs

Quiz Wazuh log

Quiz Wazuh log

University

10 Qs

nuts

nuts

Assessment

Quiz

Education

University

Easy

Created by

Ari Ari

Used 11+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology?

Deploy a Cisco ASA.

Require remote access connections through IPsec VPN.

Deploy a Cisco SSL Appliance.

Use a Syslog server to capture network traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

Frames from PC1 will be forwarded to its destination, and a log entry will be created.

Frames from PC1 will be forwarded to its destination, but a log entry will not be created.

Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.

Frames from PC1 will be dropped, and there will be no log of the violation.

Frames from PC1 will be dropped, and a log message will be created

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security countermeasure is effective for preventing CAM table overflow attacks?

port security

IP source guard

Dynamic ARP Inspection

DHCP snooping

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two examples of DoS attacks? (Choose two.)

buffer overflow

ping of death

SQL injection

port scanning

phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?

a security association

hashing algorithms

a permit access list entry

transform sets

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)

a valid access list

the ISAKMP policy

encryption

the peer

the hash

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network?

Traffic that is originating from the public network is usually blocked when traveling to the DMZ network.

Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network

Traffic that is originating from the public network is usually permitted with little or no restriction when traveling to the DMZ network.

Traffic that is originating from the public network is inspected and selectively permitted when traveling to the DMZ network.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?