2.6 - Network Infrastructure

2.6 - Network Infrastructure

Professional Development

15 Qs

quiz-placeholder

Similar activities

JAVA - Arrays

JAVA - Arrays

University - Professional Development

15 Qs

IT Fundamentals

IT Fundamentals

Professional Development

10 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Number System

Number System

Professional Development

10 Qs

Code Blaze - Round -1

Code Blaze - Round -1

University - Professional Development

10 Qs

CN Basics

CN Basics

Professional Development

10 Qs

Guess the Video Game Pets 1

Guess the Video Game Pets 1

KG - Professional Development

13 Qs

Five Nights At Freddy's: Security Breach Quiz

Five Nights At Freddy's: Security Breach Quiz

KG - Professional Development

13 Qs

2.6 - Network Infrastructure

2.6 - Network Infrastructure

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

SHUSHANT TRIPATHI

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are PINs in relation to the Cisco SAFE Security Reference Architecture? (Choose 3.)

Secure services

Internet edge

Security intelligence

WAN

Campus

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following correctly describes a screened subnet?

A hardware or virtual appliance offered by Cisco Systems that provides web security and content filtering capabilities

A security mechanism used to detect, deflect, or study unauthorized access attempts or malicious activity within a network or system.

A separate network segment that acts as a buffer zone between an internal trusted network and an external untrusted network, such as the Internet.

A security technology designed to monitor network traffic, detect malicious activities or potential security breaches, and take appropriate actions to protect the network.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of a forward proxy server?

It is a server that is used to detect, deflect, or study unauthorized access attempts or malicious activity within a network or system.

It is a server in a network that is used to create a separate network segment that acts as a buffer zone between an internal trusted network and an external untrusted network, such as the Internet.

A server that acts as an intermediary between client devices and the Internet, evaluating communications to ensure that they are valid and forwarding client requests to the Internet on behalf of the client and returning the response back to the client.

A server that acts as an intermediary between devices on the Internet and servers in a server farm, forwarding requests to the servers on behalf of the devices on the Internet and returning the response back to the devices on the Internet.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to detect, deflect, or study unauthorized access attempts or malicious activity within a network or system?

WSA

IDS/IPS

Honeypot

Screened subnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a security technology that is designed to monitor network traffic, detect malicious activities or potential security breaches, and take appropriate actions to protect the network?

WSA

Screened subnet

IPS

Honeypot

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are benefits of virtualization? (Choose two.)

It enables you to provide relaxed security measures so you do not have to worry about the underlying hardware.

It enables you to create isolated virtual networks within a single physical network infrastructure.

It enables you to eliminate all physical equipment from your environment, reducing your overall attack surface.

It enables you to create virtual sandboxes for testing and analyzing potentially malicious software or suspicious network traffic.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is designed to protect organizations from web-based threats, enforce acceptable use policies, and ensure secure and compliant web browsing for users within the network?

IPS/IDS

Cloud

Honeypot

WSA

DMZ

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?