Security+ & Network+

Security+ & Network+

University

20 Qs

quiz-placeholder

Similar activities

TOPIC 1 ISC 600

TOPIC 1 ISC 600

University

16 Qs

6. SINIF TÜRKÇE- SEVİYE BELİRLEME (EMİN HOCA)

6. SINIF TÜRKÇE- SEVİYE BELİRLEME (EMİN HOCA)

5th Grade - University

20 Qs

Ultimate office trivia quiz

Ultimate office trivia quiz

KG - Professional Development

25 Qs

BEEE Pre-test Assessment

BEEE Pre-test Assessment

University

20 Qs

Principal of marketing chapter 2

Principal of marketing chapter 2

University

20 Qs

Tes NC Feb 2021

Tes NC Feb 2021

University

20 Qs

Trivia Pronom Y / EN

Trivia Pronom Y / EN

University

15 Qs

Google Analytics Quiz

Google Analytics Quiz

University

15 Qs

Security+ & Network+

Security+ & Network+

Assessment

Quiz

Other

University

Practice Problem

Medium

Created by

ريوف الشريف

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the primary functions of firewalls in network security?

A. Encrypt all network traffic

B. Filter traffic based on rules

C. Monitor endpoint activities

D. Authenticate users

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does network segmentation improve security in an enterprise environment?

A. By blocking all external traffic

B. By isolating sensitive areas of the network

C. By encrypting all network traffic

D. By improving network speed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the difference between an IDS and an IPS

A. IDS blocks traffic, while IPS only monitors it

B. IDS detects threats, while IPS detects and blocks threats

C. IDS operates on the application layer, while IPS operates on the transport layer

D. IDS and IPS are the same

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is monitoring traffic in a DMZ critical for protecting internal systems?

A. To ensure faster network speeds

B. To block all incoming traffic

C. To detect threats before they reach internal networks

D. To provide access to sensitive internal systems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of operating system hardening, and what steps are involved?

A. Improving system performance

B. Reducing vulnerabilities through patches and configurations

C. Disabling security features for compatibility

D. Installing unnecessary applications

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Endpoint Detection and Response (EDR) enhance endpoint security compared to traditional antivirus software?

A. By using only signature-based detection

B. By offering real-time monitoring and behavioral analysis

C. By focusing on known malware threats

D. By isolating all devices on the network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the risks of granting excessive user privileges, and how can the principle of least privilege mitigate these risks?

A. Excessive privileges can slow down networks

B. Users may accidentally or intentionally compromise systems

C. Privilege levels do not impact security

D. Least privilege applies only to administrators

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?