Security Module 5 Network Architecture Review

Security Module 5 Network Architecture Review

12th Grade

30 Qs

quiz-placeholder

Similar activities

LATIHAN SOAL INFORMATIKA KLS 7

LATIHAN SOAL INFORMATIKA KLS 7

7th Grade - University

25 Qs

Form 2 - Information Technology Quiz

Form 2 - Information Technology Quiz

8th Grade - University

25 Qs

GRADE 3 QUIZ 5 SEM 1 2025-2026

GRADE 3 QUIZ 5 SEM 1 2025-2026

3rd Grade - University

25 Qs

Peramban dan Search Engine

Peramban dan Search Engine

7th Grade - University

25 Qs

Information Technology – Grade 11 – Practice Activity

Information Technology – Grade 11 – Practice Activity

11th Grade - University

25 Qs

Post Test ASJ : Hosting

Post Test ASJ : Hosting

12th Grade

25 Qs

Computer Basics

Computer Basics

9th - 12th Grade

25 Qs

Soal Ulangan Harian KKT 242 ganjil 2025

Soal Ulangan Harian KKT 242 ganjil 2025

12th Grade - University

25 Qs

Security Module 5 Network Architecture Review

Security Module 5 Network Architecture Review

Assessment

Quiz

Information Technology (IT)

12th Grade

Practice Problem

Medium

Created by

Kyle Hatfield

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two traits are commonly found in a basic packet-filtering firewall? (Select two.)

Tracks active connection states

Filters traffic by IP address and port number

Filters traffic based on websites visited

Makes decisions using session information

Operates without remembering previous packets

Answer explanation

Explanation:
Packet-filtering firewalls are stateless and only look at basic header information like IPs and ports.

Real-World Scenario:
This is like a security guard who only checks your student ID and destination every time you enter, but never remembers you from earlier.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cloud system is fully updated, yet a researcher discovers a flaw no one has ever reported. What type of vulnerability is this?

A vulnerability that is brand-new and not yet patched

A flaw caused by user-generated scripts

A database query manipulation issue

A misconfigured network device

Answer explanation

Explanation:
A zero-day vulnerability is unknown to developers and has no existing fix yet.

Real-World Scenario:
It’s like finding a hidden shortcut in a building no one else knew about — and because it hasn’t been secured, it creates risk.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company now allows personal devices and IoT equipment on the network. Which option best ensures devices are checked and placed into the correct network areas with proper restrictions?

Use NAC with installed agents, dynamic VLAN assignment, and firewall integration

Use NAC without firewall coordination

Rely only on the existing firewall

Use NAC without dynamic VLANs

Answer explanation

Explanation:
Agent-based NAC with dynamic VLANs and firewall integration provides the strongest control in mixed-device environments.

Real-World Scenario:
It’s like having students scan in at the door, then automatically directing them to the right classroom based on their schedule.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What action best reduces how many ways an attacker could compromise a server?

Remove unnecessary or unused services

Install the latest updates

Add anti-malware software

Install a host-based intrusion detection tool

Answer explanation

Explanation:
Every running service adds a potential attack point; removing unused ones shrinks the attack surface.

Real-World Scenario:
If a school locks all unused rooms, there are fewer places for someone to hide or sneak in.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack tricks devices into linking the attacker’s MAC address to another device’s IP address?

MAC spoofing

Cross-site scripting

ARP poisoning

DNS manipulation

Answer explanation

Explanation:
ARP poisoning inserts false ARP entries so traffic is misdirected to the attacker.

Real-World Scenario:
It’s like someone replacing your name on the class attendance list with their own name so your messages get routed to them

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Before enforcing an application allow-list, you want to observe traffic and record violations. How should the control software handle applications not on the list?

Slow unwanted traffic

Log and flag anything not approved

Drop all unapproved traffic

Fully block everything not approved

Answer explanation

Explanation:
Flagging allows administrators to gather data before enforcing stricter rules.

Real-World Scenario:
It’s like monitoring hallway behavior for a week before deciding on new rules.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Devices on different VLANs cannot communicate. What is the MOST likely reason, and what should you do?

Inter-VLAN routing is not turned on; enable a router or Layer 3 switch

Devices were assigned the wrong VLAN ID

The switch is missing VLAN configuration settings

Switch ports were assigned improperly

Answer explanation

Explanation:
Different VLANs require Layer 3 routing to communicate.

Real-World Scenario:
Think of two separate hallways in a building — without a connecting doorway, students can’t move between them

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?