
Security Module 5 Network Architecture Review
Quiz
•
Information Technology (IT)
•
12th Grade
•
Practice Problem
•
Medium
Kyle Hatfield
Used 1+ times
FREE Resource
Enhance your content in a minute
30 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two traits are commonly found in a basic packet-filtering firewall? (Select two.)
Tracks active connection states
Filters traffic by IP address and port number
Filters traffic based on websites visited
Makes decisions using session information
Operates without remembering previous packets
Answer explanation
Explanation:
Packet-filtering firewalls are stateless and only look at basic header information like IPs and ports.
Real-World Scenario:
This is like a security guard who only checks your student ID and destination every time you enter, but never remembers you from earlier.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cloud system is fully updated, yet a researcher discovers a flaw no one has ever reported. What type of vulnerability is this?
A vulnerability that is brand-new and not yet patched
A flaw caused by user-generated scripts
A database query manipulation issue
A misconfigured network device
Answer explanation
Explanation:
A zero-day vulnerability is unknown to developers and has no existing fix yet.
Real-World Scenario:
It’s like finding a hidden shortcut in a building no one else knew about — and because it hasn’t been secured, it creates risk.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company now allows personal devices and IoT equipment on the network. Which option best ensures devices are checked and placed into the correct network areas with proper restrictions?
Use NAC with installed agents, dynamic VLAN assignment, and firewall integration
Use NAC without firewall coordination
Rely only on the existing firewall
Use NAC without dynamic VLANs
Answer explanation
Explanation:
Agent-based NAC with dynamic VLANs and firewall integration provides the strongest control in mixed-device environments.
Real-World Scenario:
It’s like having students scan in at the door, then automatically directing them to the right classroom based on their schedule.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What action best reduces how many ways an attacker could compromise a server?
Remove unnecessary or unused services
Install the latest updates
Add anti-malware software
Install a host-based intrusion detection tool
Answer explanation
Explanation:
Every running service adds a potential attack point; removing unused ones shrinks the attack surface.
Real-World Scenario:
If a school locks all unused rooms, there are fewer places for someone to hide or sneak in.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack tricks devices into linking the attacker’s MAC address to another device’s IP address?
MAC spoofing
Cross-site scripting
ARP poisoning
DNS manipulation
Answer explanation
Explanation:
ARP poisoning inserts false ARP entries so traffic is misdirected to the attacker.
Real-World Scenario:
It’s like someone replacing your name on the class attendance list with their own name so your messages get routed to them
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Before enforcing an application allow-list, you want to observe traffic and record violations. How should the control software handle applications not on the list?
Slow unwanted traffic
Log and flag anything not approved
Drop all unapproved traffic
Fully block everything not approved
Answer explanation
Explanation:
Flagging allows administrators to gather data before enforcing stricter rules.
Real-World Scenario:
It’s like monitoring hallway behavior for a week before deciding on new rules.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Devices on different VLANs cannot communicate. What is the MOST likely reason, and what should you do?
Inter-VLAN routing is not turned on; enable a router or Layer 3 switch
Devices were assigned the wrong VLAN ID
The switch is missing VLAN configuration settings
Switch ports were assigned improperly
Answer explanation
Explanation:
Different VLANs require Layer 3 routing to communicate.
Real-World Scenario:
Think of two separate hallways in a building — without a connecting doorway, students can’t move between them
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
Web 2.0 and ICT Projects Quiz
Quiz
•
11th Grade - University
25 questions
IT Concepts 2
Quiz
•
12th Grade - University
26 questions
Fun with Computers and Mice
Quiz
•
2nd Grade - University
28 questions
Review Python_G8
Quiz
•
8th Grade - University
30 questions
Animasi kelas 6
Quiz
•
6th Grade - University
25 questions
Chapter 4 Mastering Algebraic Expressions
Quiz
•
7th Grade - University
25 questions
Jaringan Komputer Sederhana
Quiz
•
12th Grade
25 questions
INFORMATIKA 12 - US2
Quiz
•
12th Grade
Popular Resources on Wayground
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
15 questions
Solving Equations with Variables on Both Sides Review
Quiz
•
8th Grade
Discover more resources for Information Technology (IT)
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
25 questions
Preterito regular
Quiz
•
10th - 12th Grade
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade
10 questions
hands washing
Quiz
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
5 questions
Triangle Congruence Theorems
Interactive video
•
9th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
14 questions
Model and Solve Linear Equations
Quiz
•
9th - 12th Grade
