Security+ & Network+

Security+ & Network+

University

20 Qs

quiz-placeholder

Similar activities

Introduction to System Administration

Introduction to System Administration

University

15 Qs

Quiz Teknologi Informasi dan Komunikasi (TIK)

Quiz Teknologi Informasi dan Komunikasi (TIK)

University

20 Qs

Red Jerárquica

Red Jerárquica

University

20 Qs

IT Infrastructure LM11

IT Infrastructure LM11

University

20 Qs

Ethical Hacking

Ethical Hacking

University

20 Qs

Incident Response-Quiz 1

Incident Response-Quiz 1

University

15 Qs

Together We Soar

Together We Soar

KG - Professional Development

15 Qs

GROUP 6_MODULE 3

GROUP 6_MODULE 3

University

20 Qs

Security+ & Network+

Security+ & Network+

Assessment

Quiz

Other

University

Medium

Created by

ريوف الشريف

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the primary functions of firewalls in network security?

A. Encrypt all network traffic

B. Filter traffic based on rules

C. Monitor endpoint activities

D. Authenticate users

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does network segmentation improve security in an enterprise environment?

A. By blocking all external traffic

B. By isolating sensitive areas of the network

C. By encrypting all network traffic

D. By improving network speed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the difference between an IDS and an IPS

A. IDS blocks traffic, while IPS only monitors it

B. IDS detects threats, while IPS detects and blocks threats

C. IDS operates on the application layer, while IPS operates on the transport layer

D. IDS and IPS are the same

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is monitoring traffic in a DMZ critical for protecting internal systems?

A. To ensure faster network speeds

B. To block all incoming traffic

C. To detect threats before they reach internal networks

D. To provide access to sensitive internal systems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of operating system hardening, and what steps are involved?

A. Improving system performance

B. Reducing vulnerabilities through patches and configurations

C. Disabling security features for compatibility

D. Installing unnecessary applications

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Endpoint Detection and Response (EDR) enhance endpoint security compared to traditional antivirus software?

A. By using only signature-based detection

B. By offering real-time monitoring and behavioral analysis

C. By focusing on known malware threats

D. By isolating all devices on the network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the risks of granting excessive user privileges, and how can the principle of least privilege mitigate these risks?

A. Excessive privileges can slow down networks

B. Users may accidentally or intentionally compromise systems

C. Privilege levels do not impact security

D. Least privilege applies only to administrators

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?