Unit 5 Quiz

Unit 5 Quiz

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Technical Terms - Internet (A-Z) - Firewall

Technical Terms - Internet (A-Z) - Firewall

12th Grade

10 Qs

Technical Terms - Internet (A-Z) - Proxy Server

Technical Terms - Internet (A-Z) - Proxy Server

12th Grade

10 Qs

Data Transmission Security

Data Transmission Security

9th - 12th Grade

15 Qs

1.3 - Network Topologies

1.3 - Network Topologies

8th - 10th Grade

11 Qs

Networks and Devices Review

Networks and Devices Review

10th Grade

14 Qs

CompTIA Network+ 2

CompTIA Network+ 2

12th Grade

15 Qs

Understanding Firewalls and Network Security

Understanding Firewalls and Network Security

11th Grade

10 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Unit 5 Quiz

Unit 5 Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Adrian Portillo

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of controls should the network technician review?

Security

Technical

Physical

Administrative

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains why organizations implement security policies and procedures?

To improve hardware performance for all devices

To establish guidelines and rules for protecting data

To enhance user experience on the organization’s devices and network

To optimize software licenses for all members of the organization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary difference between a host-based firewall and a network-based firewall?

The supported operating system

The type of traffic being monitored

The location of deployment

The type of encryption used

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is implementing a new firewall and has hired an IT consultant to evaluate the network. Based on budgetary restrictions implemented by the organization, any firewall that tracks active connections or includes special features like intrusion prevention are not being considered. Therefore, the consultant recommends implementing a firewall that filters traffic at the network level based solely on data found in packet headers (such as IP addresses, ports, and protocols).

Which of the following types of network-based firewalls would best fit the consultant’s recommendations for the organization?

Stateless firewall

Stateful firewall

Next-generation firewall

Host-based firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A technician is trying to prevent a DoS attack on a web server by implementing an Access Control List (ACL) rule. Review the ACL rule configuration.

What impact does this rule have on inbound traffic?

The inbound traffic from the 184.25.44.0/24 network to the web server is being permitted, and all other traffic is also permitted.

The inbound traffic from the 184.25.44.0/24 network to the web server is being denied, and all other traffic is also denied.

The inbound traffic from the 184.25.44.0/24 network to the web server is being denied, but all other traffic is permitted.

The inbound traffic from the 184.25.44.0/24 network to the web server is being permitted, but all other traffic is denied.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains a screened subnet and its benefit to a network?

It is a network segment that connects multiple internal networks and is typically considered a lower security zone.

It is a network segment within an internal network that is isolated from external networks and is typically considered a higher security zone.

It is a network segment that sits between external and internal networks and is typically considered a lower security zone.

It is a network segment that is part of the internal network and is used to store sensitive data, making it a higher security zone.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator receives a notification containing the following system alerts from an IDS and an IPS.

Which of the following alerts could have only originated from an IPS?

Alert: Unauthorized access attempt

Alert: Malware detection

Alert: Blocked malicious traffic

Alert: Unauthorized configuration change

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?