Search Header Logo

Module 6 Quiz Intrusion and Intrusion Prevention

Authored by Angela May

Arts

10th Grade

Used 1+ times

Module 6 Quiz Intrusion and Intrusion Prevention
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

How do SSL/TLS proxy servers help monitor network traffic?

They decrypt encrypted packages and analyze them for malware

They scan traffic from SSH encryption for malware

They detect irregularities in behavior

They do all of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security policies should not only contain a security game plan for the IT team to follow, but also guidelines and training for employees on how to maintain security.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an ACL?

Access Control List

Anti Corruption List

Asset Collection List

There is no such thing in InDesign.

Attack Control List

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A single-source approach to port scan detection searches for attacks from a single source, whereas a distributed approach detects coordinated attacks from multiple sources.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hypervisor?

It is a server that monitors a network

It is a virtual machine monitor that allows you to host multiple virtual networks

It is a virtual operating system

It is not related to cybersecurity

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the advantages of network segmentation?

It protects sensitive data

It limits damage by isolating segments

It improves speed by diverting traffic at the source

It increases visibility of all content by sharing information across segments

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of email traps?

They are used to search for malware in emails

They are used to detect SQL injection attacks

They are used to lure spammers with the intention of blocking traffic coming from their IP address

They are used to carry out phishing attacks

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?