
Security
Authored by Dustin Dummer
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack involves a "threat actor" gaining physical access to a device and using that device to capture data transmitting between devices?
Denial-of-service
Routing attack
Man-in-the-middle attack
Eavesdropping attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of security attack prevents users from accessing a website by sending large numbers of link requests in a short period of time?
Disruption of service
Data loss
Identity theft
Information theft
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of security attack involves obtaining trade secret documents illegally?
Information theft
Identity theft
Data loss
Disruption of service
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the network security authentication process?
To determine which resources a user can access.
To keep track of the actions of a user.
To provide challenge and response questions.
To require users to prove who they are.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which firewall feature is ensures that every packet coming into a network is a legitimate response to requests initiated from internal hosts?
Application filtering
URL filtering
Stateful packet inspection
Address filtering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What network security device provides an encrypted method of authentication for remote users into a network?
Security Appliance Server (SAS)
Intrusion Prevention System (IPS)
Firewall
VPN (Virtual Private Network)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?