ICS Domain 2 Review

ICS Domain 2 Review

Assessment

Flashcard

Created by

Quizizz Content

Information Technology (IT)

9th - 12th Grade

Hard

Student preview

quiz-placeholder

20 questions

Show all answers

1.

FLASHCARD

Front

Sample IDS log entry: "Device with MAC address XX:XX:XX:XX:XX:XX attempted to access the guest wireless network. Access was denied based on MAC address filtering policy." What can be inferred about MAC addresses and IP addresses?

Back

MAC addresses remain the same, but IP addresses change

2.

FLASHCARD

Front

Which of the following is not true about IP addresses? Any IP address starting with 10 is private, Trusted networks contain all non-routable IP addresses, Any IP address starting with 192 is private, Most trusted networks use private IP addresses

Back

Any IP address starting with 192 is private

3.

FLASHCARD

Front

Which of the following is not typically located in a company's DMZ? Email server, Proxy server, Web server

Back

Directory services

4.

FLASHCARD

Front

This security technology is used to watch for potential threats, and log suspicious activities.

Back

IDS

5.

FLASHCARD

Front

Which of the following do switches and wireless access points use to control access through a device? IP address filtering, Port number filtering, MAC address filtering, Session filtering

Back

MAC address filtering

6.

FLASHCARD

Front

What type of address is this?
2001:0db8:0000:abcd:0000:0000:0000:7334

Back

IPv6

7.

FLASHCARD

Front

I sit between the internet and the network. I protect the network, by blocking viruses, malware and worms. I can be both hardware and software

Back

Firewall

8.

FLASHCARD

Front

Provide an IDS log sample based on the given questions.

Back

It monitors network traffic for suspicious activity

9.

FLASHCARD

Front

What is the MOST common form of host-based IDS that employs signature or pattern-matching detection methods?

Back

Anti-Virus software

10.

FLASHCARD

Front

This type of attack overwhelms a server by sending more GET requests than the server can handle.

Back

HTTP flooding

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?