Search Header Logo

M1 NETWORK DEFENSE

Authored by katv channel

Information Technology (IT)

University

Used 3+ times

M1 NETWORK DEFENSE
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security management function is concerned with the inventory and control of hardware and software configurations of systems?

configuration management

vulnerability management

risk management

asset management

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)

threats to assets

total number of devices that attach to the wired and wireless network

past security breaches

vulnerabilities in the system

assets that need protection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device is usually the first line of defense in a layered defense-in-depth approach?

access layer switch

firewall

edge router

internal router

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device in a layered defense-in-depth approach denies connections initiated from untrusted networks to internal networks, but allows internal users within an organization to connect to untrusted networks?

IPS

firewall

access layer switch

internal router

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?

onion

lettuce

artichoke

cabbage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the benefit of a defense-in-depth approach?

The effectiveness of other security measures is not impacted when a security mechanism fails.

Only a single layer of security at the network core is required.

The need for firewalls is eliminated.

All network vulnerabilities are mitigated.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool can be used to gather information about the different types of traffic that exist in a network?

RTP

protocol analyzer

application server

QoS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?