INF2781 - Day 9

INF2781 - Day 9

University

55 Qs

quiz-placeholder

Similar activities

(BSIT 1A) Final Exam in CC 113A

(BSIT 1A) Final Exam in CC 113A

University

50 Qs

Review Test #3

Review Test #3

12th Grade - University

57 Qs

Module 13

Module 13

University

52 Qs

Computers for Managers

Computers for Managers

University

60 Qs

Microsoft Azure Fundamentals AZ-900 ENG #4

Microsoft Azure Fundamentals AZ-900 ENG #4

University - Professional Development

55 Qs

Network Components

Network Components

University

60 Qs

N3tw0rk SeCuryTi

N3tw0rk SeCuryTi

University

60 Qs

Authentication/Access Control/Enterprise Architecture

Authentication/Access Control/Enterprise Architecture

9th Grade - University

50 Qs

INF2781 - Day 9

INF2781 - Day 9

Assessment

Quiz

Computers

University

Medium

Created by

BC Account

Used 2+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main advantage of using a security group in cloud architecture compared to traditional firewall rules?

Simplified configuration

Remote control of firewall rules

Reduces the risk of accidental exposure

More efficient packet filtering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a function of a NIDS (Network Intrusion Detection System)?

Monitoring inbound packets

Encrypting network traffic

Alerting administrators of potential attacks

Blocking suspicious IP addresses

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In traditional network architecture, which layer is primarily responsible for protecting the internal network from external threats?

Load balancer

Virtual Private Network (VPN)

Perimeter layer

DMZ (DeMilitarized Zone)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key reason corporations are moving away from perimeter-based network security?

Difficulty in managing firewall rules

Vulnerability due to compromised authentication credentials

Increased cost of maintenance

ncompatibility with cloud-based services

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best practices helps minimize the risk of network attacks in a cloud environment?

Opening all ports on a server

Running multiple network services on a single server

Using a reverse proxy

Allowing unrestricted direct access to databases

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a DMZ in network architecture?

To provide a secure zone for external users to access internal servers

To encrypt data traffic within the network

To expose external-facing services to an untrusted network

To manage load balancing across the network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a firewall in a cloud environment differ from a traditional firewall?

It does not block traffic

It operates based on physical hardware

It uses security groups instead of physical devices

It is less efficient in filtering traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?