Search Header Logo

Unit 5 Quiz

Authored by Adrian Portillo

Computers

9th - 12th Grade

Used 5+ times

Unit 5 Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of controls should the network technician review?

Security

Technical

Physical

Administrative

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains why organizations implement security policies and procedures?

To improve hardware performance for all devices

To establish guidelines and rules for protecting data

To enhance user experience on the organization’s devices and network

To optimize software licenses for all members of the organization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary difference between a host-based firewall and a network-based firewall?

The supported operating system

The type of traffic being monitored

The location of deployment

The type of encryption used

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is implementing a new firewall and has hired an IT consultant to evaluate the network. Based on budgetary restrictions implemented by the organization, any firewall that tracks active connections or includes special features like intrusion prevention are not being considered. Therefore, the consultant recommends implementing a firewall that filters traffic at the network level based solely on data found in packet headers (such as IP addresses, ports, and protocols).

Which of the following types of network-based firewalls would best fit the consultant’s recommendations for the organization?

Stateless firewall

Stateful firewall

Next-generation firewall

Host-based firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A technician is trying to prevent a DoS attack on a web server by implementing an Access Control List (ACL) rule. Review the ACL rule configuration.

What impact does this rule have on inbound traffic?

The inbound traffic from the 184.25.44.0/24 network to the web server is being permitted, and all other traffic is also permitted.

The inbound traffic from the 184.25.44.0/24 network to the web server is being denied, and all other traffic is also denied.

The inbound traffic from the 184.25.44.0/24 network to the web server is being denied, but all other traffic is permitted.

The inbound traffic from the 184.25.44.0/24 network to the web server is being permitted, but all other traffic is denied.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains a screened subnet and its benefit to a network?

It is a network segment that connects multiple internal networks and is typically considered a lower security zone.

It is a network segment within an internal network that is isolated from external networks and is typically considered a higher security zone.

It is a network segment that sits between external and internal networks and is typically considered a lower security zone.

It is a network segment that is part of the internal network and is used to store sensitive data, making it a higher security zone.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator receives a notification containing the following system alerts from an IDS and an IPS.

Which of the following alerts could have only originated from an IPS?

Alert: Unauthorized access attempt

Alert: Malware detection

Alert: Blocked malicious traffic

Alert: Unauthorized configuration change

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?