Firewalls and Network Security Study Guide Midterm

Firewalls and Network Security Study Guide Midterm

University

74 Qs

quiz-placeholder

Similar activities

MOC10961

MOC10961

University

76 Qs

MS WORD, POWERPOINT, EXCEL

MS WORD, POWERPOINT, EXCEL

University

70 Qs

ADMINISTRACIÓN DE PROYECTOS INFORMÁTICOS

ADMINISTRACIÓN DE PROYECTOS INFORMÁTICOS

University

70 Qs

TIK KELAS 7

TIK KELAS 7

KG - University

70 Qs

MUITICT_07_test

MUITICT_07_test

University

74 Qs

1ª REVISÃO DE TGTI - 3ª MENÇÃO

1ª REVISÃO DE TGTI - 3ª MENÇÃO

University

70 Qs

Exchange Quiz

Exchange Quiz

KG - University

70 Qs

Redes Parcial 2

Redes Parcial 2

12th Grade - University

77 Qs

Firewalls and Network Security Study Guide Midterm

Firewalls and Network Security Study Guide Midterm

Assessment

Quiz

Computers

University

Easy

Created by

sfwfyy7xf9 apple_user

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

74 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Zero-day exploits are new and previously unknown attacks for which no current specific defenses exist.

True

False

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

You are a network professional. You want to overcome the security shortcomings of the Domain Name System (DNS). Of the following, what is one of those shortcomings?

A fully qualified domain name (FQDN) vulnerability

Use of Microsoft Active Directory

Use of an intrusion detection system (IDS)

Use of a plaintext communication

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A combination of intrusion detection and prevention, as well as logging and monitoring, provides the best defense against what kind of attack?

Distributed denial of service (DDoS)

Zero-day exploit

SQL injection

Malicious code

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A major U.S. online retailer has discovered that thousands of purchases have been paid for by stolen credit card numbers. An initial analysis of the location of the buyers reveals IP addresses from within the U.S. Upon further investigation, it is found that the actual origin point of the fraudulent buyer is a series of IP addresses located in Asia. What technology is the fraudster using?

IP address fraud

Ingress filtering

Proxy server

Port address translation (PAT)

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Integrity is the protection against unauthorized access, while providing authorized users access to resources without obstruction.

True

False

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which type of hacker is a criminal whose career objective is to compromise IT infrastructures?

Professional

Recreational

Script kiddie

Opportunistic

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Peer pressure is a form of motivation for some hackers.

False

True

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?