Search Header Logo

Module 11 CCNASEC

Authored by Holykings0626 Holykings0626

others

Used 1+ times

Module 11 CCNASEC
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an IPS signature?

It is the timestamp that is applied to logged security events and alarms
It is the authorization that is required to implement a security policy
It is a set of rules used to detect typical intrusive activity
It is a security script that is used to detect unknown threats

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network technology uses a passive splitting device that forwards all traffic, including Layer 1 errors, to an analysis device?

IDS
network tap
SNMP
NetFlow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of an IPS operating in inline-mode?

It does not affect the flow of packets in forwarded traffic
It requires the assistance of another network device to respond to an attack
It can only send alerts and does not drop any packets
It can stop malicious traffic from reaching the intended target

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day attack?

It is an attack that results in no hosts able to connect to a network
It is an attack that has no impact on the network because the software vendor has mitigated the vulnerability
It is a computer attack that exploits unreported software vulnerabilities
It is a computer attack that occurs on the first day of the month

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a feature of an IPS?

It has no impact on latency
It can stop malicious packets
It is deployed in offline mode
It is primarily focused on identifying possible incidents

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network monitoring technology passively monitors network traffic to detect attacks?

IDS
TAP
RSPAN
IPS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which open source network monitoring technology performs real-time traffic analysis and generates alerts when threats are detected on IP networks?

Snort IPS
RSPAN
SPAN
IOS IPS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?