MTA Security Fundamentals Lesson 4

MTA Security Fundamentals Lesson 4

10th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Soil Profile

Soil Profile

9th - 12th Grade

10 Qs

Get The Job!

Get The Job!

9th - 10th Grade

15 Qs

Network Administration

Network Administration

11th - 12th Grade

10 Qs

CSD Quiz Review

CSD Quiz Review

5th - 10th Grade

15 Qs

Job Application Process

Job Application Process

10th Grade - University

10 Qs

TCP/IP Fundamentals Review Part 2

TCP/IP Fundamentals Review Part 2

11th Grade - Professional Development

15 Qs

VOCAB REVIEW: Information Technology

VOCAB REVIEW: Information Technology

9th - 12th Grade

11 Qs

IPv6 Pt 2

IPv6 Pt 2

10th - 12th Grade

13 Qs

MTA Security Fundamentals Lesson 4

MTA Security Fundamentals Lesson 4

Assessment

Quiz

Life Skills

10th - 12th Grade

Hard

Created by

Quintasia Hurt

Used 43+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following should be considered when deciding whether to use a software or hardware firewall?

Host operating system

application conflicts

operating system version

firewall service efficiency

stability

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are layers of the OSI model?

Physical

Control

Application

Network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Routing occurs at which layer of the OSI model?

Physical

Data-Link

Transport

Session

Network

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are valid firewall types?

Virtual

Network

Packet filtering

IPsec

Application

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are typically examined by a stateful inspection firewall?

IP address of the sending host

IP address of the receiving host

IP address of the router

Data packet type

Data packet size

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an attack that relies on having a user execute a malicious script embedded in a web page?

man-in-the-middle

brute force

cross-site scripting

SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small business owner has purchased a new wireless access point and wants to ensure that only his systems are able to connect to the wireless. He enables MAC address filtering and puts the MAC addresses for all his computers in the permitted table.

This filtering occurs at which layer of the OSI model?

Physical layer

Data-link layer

Network layer

Transport layer

Session layer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?