Firewalls and Network Security Study Guide Midterm

Firewalls and Network Security Study Guide Midterm

University

74 Qs

quiz-placeholder

Similar activities

Netacad CIT 161 Chapt 1

Netacad CIT 161 Chapt 1

12th Grade - University

71 Qs

Understanding IT Fundamentals Quiz

Understanding IT Fundamentals Quiz

10th Grade - University

75 Qs

Networking and Telecommunication

Networking and Telecommunication

10th Grade - University

74 Qs

Ethernet Concepts

Ethernet Concepts

University

71 Qs

CFall4-7

CFall4-7

University

76 Qs

Chapter 2 Quiz

Chapter 2 Quiz

University

75 Qs

CCNA

CCNA

University

75 Qs

Firewalls and Network Security Study Guide Midterm

Firewalls and Network Security Study Guide Midterm

Assessment

Quiz

Computers

University

Easy

Created by

sfwfyy7xf9 apple_user

Used 2+ times

FREE Resource

74 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Zero-day exploits are new and previously unknown attacks for which no current specific defenses exist.

True

False

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

You are a network professional. You want to overcome the security shortcomings of the Domain Name System (DNS). Of the following, what is one of those shortcomings?

A fully qualified domain name (FQDN) vulnerability

Use of Microsoft Active Directory

Use of an intrusion detection system (IDS)

Use of a plaintext communication

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A combination of intrusion detection and prevention, as well as logging and monitoring, provides the best defense against what kind of attack?

Distributed denial of service (DDoS)

Zero-day exploit

SQL injection

Malicious code

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A major U.S. online retailer has discovered that thousands of purchases have been paid for by stolen credit card numbers. An initial analysis of the location of the buyers reveals IP addresses from within the U.S. Upon further investigation, it is found that the actual origin point of the fraudulent buyer is a series of IP addresses located in Asia. What technology is the fraudster using?

IP address fraud

Ingress filtering

Proxy server

Port address translation (PAT)

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Integrity is the protection against unauthorized access, while providing authorized users access to resources without obstruction.

True

False

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which type of hacker is a criminal whose career objective is to compromise IT infrastructures?

Professional

Recreational

Script kiddie

Opportunistic

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Peer pressure is a form of motivation for some hackers.

False

True

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?