What three types of ICMP traffic should be allowed to access an internal network from the internet (Select Three)
CyberOps Chapter 24-25 Review

Quiz
•
Computers
•
9th - 12th Grade
•
Hard
Jeremy 2024
Used 5+ times
FREE Resource
32 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 3 pts
Squelch
Destination Unreachable
Request
Reply
Time Exceeded
Answer explanation
ACLs should only permit special types of ICMP messages to enter an internal network. Allowed ICMP traffic includes an ICMP reply, source quench, and any ICMP unreachable messages. All other ICMP traffic types should be denied.
2.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
Alert Data consists of which two (Select Two)
Intrusion Detection System (IDS)
Network Intrusion Detection Syestem (NIDS)
Host-Based Intrusion Detection System (HIDS)
Intrusion Prevention System (IPS)
Answer explanation
Alert data consists of messages generated by intrusion prevention systems (IPSs) or intrusion detection systems (IDSs) in response to traffic that violates a rule or matches the signature of a known exploit. A network IDS (NIDS), such as Snort, comes configured with rules for known exploits.
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In which way does the use of HTTPS increase the security monitoring challenges within enterprise networks
HTTPS traffic can carry a much larger payload than HTTP can carry
HTTPS traffic enabled end-to-end encryption
HTTPS does not require authentication
HTTPS traffic is much faster than HTTP traffic
Answer explanation
HTTPS enables end-to-end encrypted network communication, which adds further challenges for network administrators to monitor the content of packets to catch malicious attacks.
4.
FILL IN THE BLANK QUESTION
45 sec • 3 pts
What type of server can threat actors use DNS to communicate with?
Answer explanation
Some malware uses DNS to communicate with command-and-control (CnC) servers to exfiltrate data in traffic that is disguised as normal DNS query traffic.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What uses a server deamon that accepts messages and creates a collection of logs
AAA
SSH
WIndows Host Log Events
syslog
Answer explanation
Syslog is important to security monitoring because network devices send periodic messages to the syslog server. These logs can be examined to detect inconsistencies and issues within the network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How are iFrames used by cybercriminals
The iFrame allows multiple DNS subdomains to be used
The iFrame allows the browser to load a webpage from another source
To become invincible for a moment then demolish the enemy
The attacker embeds malicous content in business apropriate files
the attacker redirects traffic to an incorrect DNS server
Answer explanation
An inline frame or iFrame is an HTML element that allows the browser to load a different web page from another source.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can NAT/PAT complicate network security monitoring if NetFlow is being used?
Disguises the application initiated by a user by manipulating port numbers.
It hides internal IP addresses by allowing them to share one or a few outside IP addresses.
It conceals the contents of a packet by encrypting the data payload.
It changes the source and destination MAC addresses.
Answer explanation
NAT/PAT maps multiple internal IP addresses with only a single or a few outside IP addresses breaking end-to-end flows. The result makes it difficult to log the inside device that is requesting and receiving the traffic. This is especially a problem with a NetFlow application because NetFlow flows are unidirectional and are defined by the addresses and ports that they share.
Create a free account and access millions of resources
Similar Resources on Quizizz
30 questions
FINAL EXAM INTRODUCTION TO SECURITY

Quiz
•
11th Grade
34 questions
Cybersecurity Formative Assessment

Quiz
•
12th Grade - University
31 questions
Unit 10 Communication CIE ICT IGCSE

Quiz
•
8th - 11th Grade
29 questions
Year 8 Term 2 revision ICT 8-02

Quiz
•
8th - 9th Grade
27 questions
Network Security - Modules 5-7

Quiz
•
12th Grade
34 questions
CompTIA Security + (Part 1)

Quiz
•
12th Grade
28 questions
CLASS 12TH COMPUTER APPLICATIONS SB- II-MID TERM

Quiz
•
12th Grade
30 questions
Cambridge Technical Unit 1 LO3

Quiz
•
12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
Discover more resources for Computers
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
10 questions
Right Triangles: Pythagorean Theorem and Trig

Quiz
•
11th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade
24 questions
LSO - Virus, Bacteria, Classification - sol review 2025

Quiz
•
9th Grade
65 questions
MegaQuiz v2 2025

Quiz
•
9th - 12th Grade