Firewall & IDS

Firewall & IDS

University

10 Qs

quiz-placeholder

Similar activities

3.4 Pengalamatan IP pada jaringan komputer (KOMJARDAS)

3.4 Pengalamatan IP pada jaringan komputer (KOMJARDAS)

1st Grade - University

15 Qs

Konfigurasi VLAN

Konfigurasi VLAN

University

10 Qs

External Devices

External Devices

University

10 Qs

Chapter 5- Scanning

Chapter 5- Scanning

University

13 Qs

Computer Networks quiz

Computer Networks quiz

University

10 Qs

Prework Etapa 1 - Bogotá

Prework Etapa 1 - Bogotá

University

10 Qs

Administrasi Server Jaringan

Administrasi Server Jaringan

12th Grade - University

15 Qs

TIC - S11

TIC - S11

University

10 Qs

Firewall & IDS

Firewall & IDS

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Wahyu Adi Prabowo

Used 38+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

2. Which of the following is an advantage of the network host based configuration?

Resistant to ip spoofing

inexpensive

more secure

has user authentification

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

3. Which of the following is a combination of firewalls

Screened firewalls

Router based firewalls

Dual homed firewalls

Bastion host firewalls

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

4. What type of firewall requires client applications to be authorised to connect

Dual homed

Screened gateway

Stateful packet inspection

Application gateway

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A device that hides its internal IP addresses is called

Dual homed host

Proxy server

Screened host

Bastion firewall

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

IDS is an acronym for

Intrusion-deterrence system

Intrusion-deterrence service

Intrusion-detection system

Intrusion-deterrence service

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Attempting to attract intruders to a system set up to monitor them is called what

Intrusion dettection

Intrusion deflection

Intrusion routing

Intrusion banishment

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A system that is setup for attracting and monitoring intruders is called

Honeypot

Router

Tracert

Host Based

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers