5.4 Review

5.4 Review

12th Grade

25 Qs

quiz-placeholder

Similar activities

REMEDIAL SAS PKP JAR 2023

REMEDIAL SAS PKP JAR 2023

9th - 12th Grade

20 Qs

Deploying Printers Using Group Policy

Deploying Printers Using Group Policy

12th Grade - University

20 Qs

Chapter 1

Chapter 1

9th - 12th Grade

25 Qs

Cyber Security Month 2019

Cyber Security Month 2019

KG - Professional Development

20 Qs

QUIZZ AIJ XII - LOAD BALANCING

QUIZZ AIJ XII - LOAD BALANCING

KG - Professional Development

30 Qs

Module 1- Welding Safety 29101-15

Module 1- Welding Safety 29101-15

9th - 12th Grade

20 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

5.4 Review

5.4 Review

Assessment

Quiz

Education

12th Grade

Hard

Created by

Joanna Hovis

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the primary concern is to secure against application-specific attacks, which of the following strategies should the network security engineer consider implementing?

Deploy Layer 7 firewalls on all network edges

Use Layer 4 firewalls for all internet-facing applications

Rely solely on Layer 4 firewalls for internal traffic

Deploy Layer 4 firewalls on all network edges

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A company's web server is openly accessible to the internet, demanding heightened security measures. Considering the need for essential protocols and the introduction of a screened subnet, how should the company configure the firewall's access control lists (ACLs)?

Block all ports and protocols; enable a screened subnet for the server.

Allow all ports and protocols; do not create a screened subnet.

Permit only FTP, SSH, and enable File Integrity Monitoring; disregard screened subnet implementation.

Permit Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) on firewall access control lists (ACLs); establish a screened subnet for the web server.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A cyber team implements new hardening techniques after a data loss prevention (DLP) audit revealed increased data exfiltration. What is a tenet of host-based firewalls?

It provides controls for incoming and outgoing network traffic.

It describes software tools that monitor and protect individual hosts.

It uses signature-based detection and anomaly detection.

It requires deploying and configuring specialized software agents.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A newly established e-commerce company experienced increased web-based attacks on its online shopping platform. As a result, the company installed a Web Application Firewall (WAF) to enhance its security infrastructure. What primary function should the network security manager ensure the WAF is performing to protect the online platform from the MOST common types of web-based threats, such as Cross-site Scripting (XSS), Structured Query Language (SQL) Injection, and Cross-site Request Forgery?

Monitor traffic and block DDoS attacks

Encrypt data in transit

Validate input and output

Inspect HTTPS traffic

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are features of an application-level gateway? (Select two.)

Reassembles entire messages

Verifies that packets are properly sequenced

Uses access control lists

Stops each packet at the firewall for inspection

Allows only valid packets within approved sessions

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A network security administrator's responsibilities include enhancing the enterprise's network infrastructure security posture. They deploy a Next Generation Firewall (NGFW) as part of their defense strategy. The enterprise mixes internal and external services, including a web application and a virtual private network (VPN) for remote access. Which of the following should the administrator primarily consider when implementing the NGFW to ensure effective security without disrupting normal operations?

Deploy the NGFW in inline mode, ensuring it analyzes all traffic while maintaining connectivity.

Position the NGFW as a jump server to manage secure access for all network services.

Set the NGFW to operate in a fail-open mode, ensuring continuous network service even if the firewall fails.

Use the NGFW as a load balancer, distributing network traffic across multiple servers.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security architect designs a solution to protect the organization's network from advanced threats and provides granular access controls based on user roles. The organization has a significant volume of TLS-encrypted traffic that needs inspection and wants to integrate the solution with its network directory for role-based content filtering. Which of the following should the security architect consider the MOST appropriate option?

A standard stateful firewall with Layer 4 filtering capabilities

A jump server with enhanced remote access capabilities

A Web Application Firewall (WAF) designed primarily to protect web applications from targeted attacks

A Next Generation Firewall (NGFW) with Layer 7 application-aware filtering and intrusion prevention system (IPS) functionality

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?