Networks and Security: Quiz 9

Networks and Security: Quiz 9

Assessment

Quiz

Created by

John Coder

Computers

Professional Development

Hard

Student preview

quiz-placeholder

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A fi______________ is a network security device that monitors traffic to and from your network

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A firewall can use port fil_______, which blocks or allows certain port numbers to limit unwanted communication. For example, it could have a rule that only allows communications on port 443 for HTTPS or port 25 for email and blocks everything else. These firewall settings will be determined by the organization's security policy.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A ha__________ firewall is considered the most basic way to defend against threats to a network. It inspects each data packet before it's allowed to enter the network.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A so_______ firewall it's a software program installed on a computer or on a server. If it is installed on a computer, it will analyze all the tr_______ received by that computer. If it is installed on a server, it will protect all the devices connected to the server. It typically costs less than purchasing a separate physical device, and it doesn't take up any extra space.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

All the firewalls we have discussed can be either state___ or state___.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

state___ refers to a class of firewall that keeps track of information passing through it and proactively filters out threats. A state___ firewall analyzes network traffic for characteristics and behavior that appear suspicious and stops them from entering the network.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

state_____ refers to a class of firewall that operates based on predefined rules and does not keep track of information from data packets. A state_____ firewall only acts according to preconfigured rules set by the firewall administrator. The rules programmed by the firewall administrator tell the device what to accept and what to reject. A state_____ firewall doesn't store analyzed information. It also doesn't discover suspicious trends like a other firewall does. For this reason, stateless firewalls are considered less secure.

8.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A next generation firewall, or NGFW, provides even more security than a state____ firewall. Not only does an NGFW provide state____inspection of incoming and outgoing traffic, but it also performs more in-depth security functions like deep packet inspection and intrusion protection. Some NGFWs connect to cloud-based threat intelligence services so they can quickly update to protect against emerging cyber threats.

9.

FILL IN THE BLANK QUESTION

1 min • 1 pt

When you connect to the internet, your internet service provider receives your network's requests and forwards it to the correct destination server. But your internet requests include your private information. That means if the traffic gets inter_________, someone could potentially connect your internet activity with your ph________ location and your personal information. This includes some information that you want to keep private, like bank accounts and credit card numbers. A virtual private network, also known as a VPN, is a network security service that changes your public ___ address and hides your virtual location so that you can keep your data private when you're using a public network like the internet.

10.

FILL IN THE BLANK QUESTION

1 min • 1 pt

VPNs also encrypt your data as it travels across the internet to preserve confidentiality. A VPN service performs enc___________ on your data in transit. enc___________is a process performed by a VPN service that protects your data by wrapping sensitive data in other data packets. This allows your network requests to reach their destination, but still encrypts your personal data so it's unreadable while in transit. A VPN also uses an encrypted tu________ between your device and the VPN server. The encryption is unhackable without a cryptographic key, so no one can access your data.

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?