ICS Domain 2 Review

ICS Domain 2 Review

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Ulangan 1 ASJ (SSH, FTP, SAMBA)

Ulangan 1 ASJ (SSH, FTP, SAMBA)

11th Grade

20 Qs

PTS Genap Informatika Kelas XII

PTS Genap Informatika Kelas XII

12th Grade - University

20 Qs

Uji Pengetahuan Informatika

Uji Pengetahuan Informatika

9th Grade

20 Qs

UJIAN AKHIR

UJIAN AKHIR

11th Grade

20 Qs

The Role of IETF & Network Protocols

The Role of IETF & Network Protocols

10th Grade - University

15 Qs

Konfigurasi Dasar MikroTik

Konfigurasi Dasar MikroTik

12th Grade - University

20 Qs

CPT C10 Networking (Network Hardware and Addresses)

CPT C10 Networking (Network Hardware and Addresses)

10th Grade

20 Qs

Configurazione di base di un router

Configurazione di base di un router

9th Grade

15 Qs

ICS Domain 2 Review

ICS Domain 2 Review

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Created by

Leila Thomas

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sample IDS log entry: "Device with MAC address XX:XX:XX:XX:XX:XX attempted to access the guest wireless network. Access was denied based on MAC address filtering policy."

MAC addresses remain the same, but IP addresses change

IDS can detect host MAC address quicker than the IP address

MAC addresses can not be spoofed, but IP addresses are susceptible to spoofing

MAC addresses are easier to secure because they don't send data across networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not true about IP addresses?

Any IP address starting with 10 is private

Trusted networks contain all non-routable IP addresses

Any IP address starting with 192 is private

Most trusted networks use private IP addresses

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not typically located in a company's DMZ?

Email server

Directory services

Proxy server

Web server

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This security technology is used to watch for potential threats, and log suspicious activities.

IDS

IPS

NAT

Proxy server

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following do switches and wireless access points use to control access through a device?

IP address filtering

Port number filtering

MAC address filtering

Session filtering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What type of address is this?

2001:0db8:0000:abcd:0000:0000:0000:7334

IPv6

IPv4

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

I sit between the internet and the network. I protect the network, by blocking viruses, malware and worms. I can be both hardware and software

Router

Firewall

Ethernet Cable

Modem

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?