
Network and Security Quiz
Quiz
•
Information Technology (IT)
•
Professional Development
•
Practice Problem
•
Medium
Professional Student
Used 1+ times
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to block all incoming traffic from a specific country to prevent common cyberattacks originating from that region. Which security tool is best suited for this task?
An Intrusion Detection System (IDS)
An Intrusion Prevention System (IPS)
A packet-filtering firewall
A Web Application Firewall (WAF)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator notices a high volume of unauthorized login attempts to a server from a single IP address. Which security device is designed to both detect this activity and automatically block the source IP address in real-time?
Firewall
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Load Balancer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a key advantage of using HTTPS over HTTP?
It is faster.
It uses a simpler protocol.
It encrypts the data in transit.
It is less vulnerable to DDoS attacks.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network security professional decides to implement a stateful firewall. Why is this considered more secure than a simple packet-filtering firewall?
It inspects the content of the data packet.
It can detect and block viruses.
It keeps a record of active connections and only allows traffic that is part of an established session.
It is much cheaper and easier to configure.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your server is configured to allow SSH connections. Which protocol's secure counterpart should you use to ensure your remote management is protected from eavesdropping?
HTTP
SFTP
Telnet
FTP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a core principle of 'OS hardening'?
Installing a new operating system.
Reducing the attack surface by disabling unnecessary services.
Encrypting the entire hard drive.
Installing a third-party antivirus program.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious actor gains control of a user's Windows laptop by exploiting a memory-based vulnerability. The attacker never writes a file to the hard drive. Which security solution is specifically designed to detect this type of fileless malware?
Traditional signature-based antivirus
A host-based firewall
A Network Intrusion Detection System (NIDS)
An Endpoint Detection and Response (EDR) solution
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Evaluación Inicial - Procesador de textos I
Quiz
•
Professional Development
20 questions
Chapter 3: Malicious Activity
Quiz
•
Professional Development
20 questions
Chapter 5: Reconnaissance and Intelligence Gathering
Quiz
•
Professional Development
28 questions
CLF-C02 - Sim. 28 Questões Semana 4 - AWS Cloud Pratiticioner
Quiz
•
Professional Development
20 questions
QUIZ SOBRE TECNOLOGIA
Quiz
•
Professional Development
20 questions
Cybersecurity and IT Infrastructure Quiz
Quiz
•
Professional Development
20 questions
Refreshment Operator - Current Transformer
Quiz
•
Professional Development
20 questions
SwiftUI Test
Quiz
•
Professional Development
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
