2.6 - Network Infrastructure

2.6 - Network Infrastructure

Professional Development

15 Qs

quiz-placeholder

Similar activities

Cloud Computing

Cloud Computing

Professional Development

10 Qs

Quiz Pertemuan 7

Quiz Pertemuan 7

University - Professional Development

20 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

DAY-3-WORKSHOP

DAY-3-WORKSHOP

Professional Development

16 Qs

ITF - Quiz 9.1 - Network Components

ITF - Quiz 9.1 - Network Components

Professional Development

15 Qs

Introduction to Cloud Native Fundamentals Quiz

Introduction to Cloud Native Fundamentals Quiz

University - Professional Development

15 Qs

CTJGP-5 Virtualization

CTJGP-5 Virtualization

Professional Development

19 Qs

Virtualization

Virtualization

Professional Development

17 Qs

2.6 - Network Infrastructure

2.6 - Network Infrastructure

Assessment

Quiz

Computers

Professional Development

Medium

Created by

SHUSHANT TRIPATHI

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are PINs in relation to the Cisco SAFE Security Reference Architecture? (Choose 3.)

Secure services

Internet edge

Security intelligence

WAN

Campus

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following correctly describes a screened subnet?

A hardware or virtual appliance offered by Cisco Systems that provides web security and content filtering capabilities

A security mechanism used to detect, deflect, or study unauthorized access attempts or malicious activity within a network or system.

A separate network segment that acts as a buffer zone between an internal trusted network and an external untrusted network, such as the Internet.

A security technology designed to monitor network traffic, detect malicious activities or potential security breaches, and take appropriate actions to protect the network.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a forward proxy server?

It is a server that is used to detect, deflect, or study unauthorized access attempts or malicious activity within a network or system.

It is a server in a network that is used to create a separate network segment that acts as a buffer zone between an internal trusted network and an external untrusted network, such as the Internet.

A server that acts as an intermediary between client devices and the Internet, evaluating communications to ensure that they are valid and forwarding client requests to the Internet on behalf of the client and returning the response back to the client.

A server that acts as an intermediary between devices on the Internet and servers in a server farm, forwarding requests to the servers on behalf of the devices on the Internet and returning the response back to the devices on the Internet.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to detect, deflect, or study unauthorized access attempts or malicious activity within a network or system?

WSA

IDS/IPS

Honeypot

Screened subnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security technology that is designed to monitor network traffic, detect malicious activities or potential security breaches, and take appropriate actions to protect the network?

WSA

Screened subnet

IPS

Honeypot

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are benefits of virtualization? (Choose two.)

It enables you to provide relaxed security measures so you do not have to worry about the underlying hardware.

It enables you to create isolated virtual networks within a single physical network infrastructure.

It enables you to eliminate all physical equipment from your environment, reducing your overall attack surface.

It enables you to create virtual sandboxes for testing and analyzing potentially malicious software or suspicious network traffic.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is designed to protect organizations from web-based threats, enforce acceptable use policies, and ensure secure and compliant web browsing for users within the network?

IPS/IDS

Cloud

Honeypot

WSA

DMZ

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?