ICS Domain 2 Review

ICS Domain 2 Review

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

JAVA Q2 WW1

JAVA Q2 WW1

11th Grade

20 Qs

Urządzenia komputerowe w sieci

Urządzenia komputerowe w sieci

9th Grade

16 Qs

Web Browser

Web Browser

9th Grade - University

20 Qs

8-klass informatika

8-klass informatika

8th Grade - University

15 Qs

Kuis Pemahaman Sistem Operasi

Kuis Pemahaman Sistem Operasi

11th Grade

21 Qs

Ulangan Harian 2

Ulangan Harian 2

10th Grade

15 Qs

Quiz sui Messaggi ICMP e Test di Connettività

Quiz sui Messaggi ICMP e Test di Connettività

9th Grade

15 Qs

Quiz Topologi Jaringan Komputer

Quiz Topologi Jaringan Komputer

12th Grade

18 Qs

ICS Domain 2 Review

ICS Domain 2 Review

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Practice Problem

Medium

Created by

Leila Thomas

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sample IDS log entry: "Device with MAC address XX:XX:XX:XX:XX:XX attempted to access the guest wireless network. Access was denied based on MAC address filtering policy."

MAC addresses remain the same, but IP addresses change

IDS can detect host MAC address quicker than the IP address

MAC addresses can not be spoofed, but IP addresses are susceptible to spoofing

MAC addresses are easier to secure because they don't send data across networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not true about IP addresses?

Any IP address starting with 10 is private

Trusted networks contain all non-routable IP addresses

Any IP address starting with 192 is private

Most trusted networks use private IP addresses

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not typically located in a company's DMZ?

Email server

Directory services

Proxy server

Web server

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This security technology is used to watch for potential threats, and log suspicious activities.

IDS

IPS

NAT

Proxy server

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following do switches and wireless access points use to control access through a device?

IP address filtering

Port number filtering

MAC address filtering

Session filtering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What type of address is this?

2001:0db8:0000:abcd:0000:0000:0000:7334

IPv6

IPv4

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

I sit between the internet and the network. I protect the network, by blocking viruses, malware and worms. I can be both hardware and software

Router

Firewall

Ethernet Cable

Modem

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?