cybersecurity-common security infrastructure security

Quiz
•
Information Technology (IT)
•
University
•
Medium
NOOR (PSP)
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary function of a firewall in network security?
Identifying and isolating malware within the network
Connecting internal networks directly to the internet
Filtering incoming and outgoing traffic based on security policies
Increasing internet access speed
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main benefit of using a Virtual Private Network (VPN)?
Encrypting data and hiding the real IP address on a public network
Enhancing firewall functionality to prevent cyberattacks
Increasing the processing speed of network devices
Allowing unrestricted access to the internal network
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does an Intrusion Detection System (IDS) protect a network?
By actively blocking unauthorized access to the network
By detecting anomalies and alerting administrators before damage occurs
By encrypting all network traffic to prevent eavesdropping
By replacing the need for firewalls and VPNs
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a honeypot used for in cybersecurity?
To prevent network congestion by filtering excess traffic
To serve as a decoy system that attracts and studies cyber attackers
To provide an additional layer of authentication for users
To block unauthorized access to private network resources
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a network security setup, what does a Demilitarized Zone (DMZ) do?
It isolates the most secure parts of a network from the internet
It acts as a buffer zone between public and private networks
It encrypts all network communications for security
It replaces the need for firewalls and IDS systems
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes Network Performance Monitoring (NPM)?
A method to track and improve network performance and security
A security tool that blocks all unauthorized network access
A software that encrypts network communications
A firewall extension for additional security
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why do organizations deploy honeypots in their networks?
To speed up data transmission across the internet
To act as a lure for attackers and analyze attack patterns
To block all unauthorized access attempts
To replace the need for firewalls and IDS
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

Quiz
•
University
20 questions
RIDDLE_IT_OUT

Quiz
•
University
16 questions
Test Kemanan Komputer Pertemuan 01

Quiz
•
University
20 questions
NET102: Quiz No. 1

Quiz
•
University
20 questions
Cybeteria Meetup July, 2025

Quiz
•
University
20 questions
PTS Genap Informatika Kelas XII

Quiz
•
12th Grade - University
10 questions
Network secutiry

Quiz
•
9th Grade - University
19 questions
Cybersecurity Fundamentals Theory Test 2

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade