2.6 - Network Infrastructure

2.6 - Network Infrastructure

Professional Development

15 Qs

quiz-placeholder

Similar activities

UDC 2022

UDC 2022

Professional Development

10 Qs

Mastering KineMaster

Mastering KineMaster

Professional Development

10 Qs

KOE034: Sensors and Instruments

KOE034: Sensors and Instruments

Professional Development

11 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

Cloud computing 2

Cloud computing 2

Professional Development

10 Qs

Maintain Files and Folders

Maintain Files and Folders

Professional Development

10 Qs

OWASP Top 10

OWASP Top 10

Professional Development

10 Qs

Computer Hardware and Software Quiz

Computer Hardware and Software Quiz

Professional Development

10 Qs

2.6 - Network Infrastructure

2.6 - Network Infrastructure

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

SHUSHANT TRIPATHI

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are PINs in relation to the Cisco SAFE Security Reference Architecture? (Choose 3.)

Secure services

Internet edge

Security intelligence

WAN

Campus

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following correctly describes a screened subnet?

A hardware or virtual appliance offered by Cisco Systems that provides web security and content filtering capabilities

A security mechanism used to detect, deflect, or study unauthorized access attempts or malicious activity within a network or system.

A separate network segment that acts as a buffer zone between an internal trusted network and an external untrusted network, such as the Internet.

A security technology designed to monitor network traffic, detect malicious activities or potential security breaches, and take appropriate actions to protect the network.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a forward proxy server?

It is a server that is used to detect, deflect, or study unauthorized access attempts or malicious activity within a network or system.

It is a server in a network that is used to create a separate network segment that acts as a buffer zone between an internal trusted network and an external untrusted network, such as the Internet.

A server that acts as an intermediary between client devices and the Internet, evaluating communications to ensure that they are valid and forwarding client requests to the Internet on behalf of the client and returning the response back to the client.

A server that acts as an intermediary between devices on the Internet and servers in a server farm, forwarding requests to the servers on behalf of the devices on the Internet and returning the response back to the devices on the Internet.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to detect, deflect, or study unauthorized access attempts or malicious activity within a network or system?

WSA

IDS/IPS

Honeypot

Screened subnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security technology that is designed to monitor network traffic, detect malicious activities or potential security breaches, and take appropriate actions to protect the network?

WSA

Screened subnet

IPS

Honeypot

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are benefits of virtualization? (Choose two.)

It enables you to provide relaxed security measures so you do not have to worry about the underlying hardware.

It enables you to create isolated virtual networks within a single physical network infrastructure.

It enables you to eliminate all physical equipment from your environment, reducing your overall attack surface.

It enables you to create virtual sandboxes for testing and analyzing potentially malicious software or suspicious network traffic.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is designed to protect organizations from web-based threats, enforce acceptable use policies, and ensure secure and compliant web browsing for users within the network?

IPS/IDS

Cloud

Honeypot

WSA

DMZ

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?