Network and Security Quiz

Network and Security Quiz

Professional Development

25 Qs

quiz-placeholder

Similar activities

¿Qué sabes de IA?

¿Qué sabes de IA?

Professional Development

20 Qs

CB-Quiz On AWS_IAM USER

CB-Quiz On AWS_IAM USER

Professional Development

20 Qs

Chapter 10: Incident Detection and Analysis

Chapter 10: Incident Detection and Analysis

Professional Development

20 Qs

cases (21-40)

cases (21-40)

Professional Development

20 Qs

Quiz for Puducherry State Connect Programme

Quiz for Puducherry State Connect Programme

Professional Development

21 Qs

Act. 2: Controles en Word

Act. 2: Controles en Word

Professional Development

20 Qs

Mantemiento de PC

Mantemiento de PC

Professional Development

20 Qs

Network and Security Quiz

Network and Security Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Medium

Created by

Professional Student

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to block all incoming traffic from a specific country to prevent common cyberattacks originating from that region. Which security tool is best suited for this task?

An Intrusion Detection System (IDS)

An Intrusion Prevention System (IPS)

A packet-filtering firewall

A Web Application Firewall (WAF)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator notices a high volume of unauthorized login attempts to a server from a single IP address. Which security device is designed to both detect this activity and automatically block the source IP address in real-time?

Firewall

Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

Load Balancer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key advantage of using HTTPS over HTTP?

It is faster.

It uses a simpler protocol.

It encrypts the data in transit.

It is less vulnerable to DDoS attacks.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security professional decides to implement a stateful firewall. Why is this considered more secure than a simple packet-filtering firewall?

It inspects the content of the data packet.

It can detect and block viruses.

It keeps a record of active connections and only allows traffic that is part of an established session.

It is much cheaper and easier to configure.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your server is configured to allow SSH connections. Which protocol's secure counterpart should you use to ensure your remote management is protected from eavesdropping?

HTTP

SFTP

Telnet

FTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a core principle of 'OS hardening'?

Installing a new operating system.

Reducing the attack surface by disabling unnecessary services.

Encrypting the entire hard drive.

Installing a third-party antivirus program.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious actor gains control of a user's Windows laptop by exploiting a memory-based vulnerability. The attacker never writes a file to the hard drive. Which security solution is specifically designed to detect this type of fileless malware?

Traditional signature-based antivirus

A host-based firewall

A Network Intrusion Detection System (NIDS)

An Endpoint Detection and Response (EDR) solution

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?