INFOE 4 Chapter 5 quiz

INFOE 4 Chapter 5 quiz

University

15 Qs

quiz-placeholder

Similar activities

CHAPTER 4: IDS AND IPS

CHAPTER 4: IDS AND IPS

University

10 Qs

CH 12- Defense in Depth

CH 12- Defense in Depth

University

10 Qs

AIJ (Memahami Fairewall)

AIJ (Memahami Fairewall)

University

10 Qs

Quiz 1

Quiz 1

University

11 Qs

Network Security L1-Introduction

Network Security L1-Introduction

University

14 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Cloud Security

Cloud Security

University

10 Qs

Quiz Keamanan Jaringan

Quiz Keamanan Jaringan

10th Grade - University

10 Qs

INFOE 4 Chapter 5 quiz

INFOE 4 Chapter 5 quiz

Assessment

Quiz

Computers

University

Easy

Created by

JEWEL MORALES

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

10 mins • 1 pt

1. It is a network security device or software application that monitors network traffic for suspicious activity and known threats.

A. Intrusion Detection System C. Signature-based detection

B. Intrusion Prevention System D. Anomaly-based detection

2.

FILL IN THE BLANK QUESTION

10 mins • 1 pt

A type of detection wherein it identifies threats by comparing incoming network traffic against a database of known threat signatures.

A. Intrusion Detection System C. Signature-based detection

B. Intrusion Prevention System D. Anomaly-based detection

3.

FILL IN THE BLANK QUESTION

10 mins • 1 pt

It is a network security device or software application that not only detects but also actively prevents and blocks suspicious activity and threats.

A. Intrusion Detection System C. Signature-based detection

B. Intrusion Prevention System D. Anomaly-based detect

4.

FILL IN THE BLANK QUESTION

10 mins • 1 pt

It identifies threats by monitoring network traffic and comparing it to a baseline of normal behavior.

A. Intrusion Detection System C. Signature-based detection

B. Intrusion Prevention System D. Anomaly-based detection

5.

FILL IN THE BLANK QUESTION

10 mins • 1 pt

A type of IPS that monitors and protects the network traffic at key points within the network.

A. Intrusion Detection System C. Network-based IPS

B. Intrusion Prevention System D. Host-based IPS

6.

FILL IN THE BLANK QUESTION

10 mins • 1 pt

What is an Intrusion Detection System (IDS)?

A. A software that only prevents threats

B. A network security device that monitors traffic for suspicious activity

C. A firewall replacement

D. A system that encrypts network traffic

7.

FILL IN THE BLANK QUESTION

10 mins • 1 pt

What is the primary function of an IDS?
A. Preventing threats in real time
B. Encrypting data
C. Monitoring, detecting, and alerting on suspicious activity
D. Deleting suspicious files

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?