A fi______________ is a network security device that monitors traffic to and from your network

Networks and Security: Quiz 9

Quiz
•
John Coder
•
Computers
•
Professional Development
•
Hard
Student preview

10 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A firewall can use port fil_______, which blocks or allows certain port numbers to limit unwanted communication. For example, it could have a rule that only allows communications on port 443 for HTTPS or port 25 for email and blocks everything else. These firewall settings will be determined by the organization's security policy.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A ha__________ firewall is considered the most basic way to defend against threats to a network. It inspects each data packet before it's allowed to enter the network.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A so_______ firewall it's a software program installed on a computer or on a server. If it is installed on a computer, it will analyze all the tr_______ received by that computer. If it is installed on a server, it will protect all the devices connected to the server. It typically costs less than purchasing a separate physical device, and it doesn't take up any extra space.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
All the firewalls we have discussed can be either state___ or state___.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
state___ refers to a class of firewall that keeps track of information passing through it and proactively filters out threats. A state___ firewall analyzes network traffic for characteristics and behavior that appear suspicious and stops them from entering the network.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
state_____ refers to a class of firewall that operates based on predefined rules and does not keep track of information from data packets. A state_____ firewall only acts according to preconfigured rules set by the firewall administrator. The rules programmed by the firewall administrator tell the device what to accept and what to reject. A state_____ firewall doesn't store analyzed information. It also doesn't discover suspicious trends like a other firewall does. For this reason, stateless firewalls are considered less secure.
8.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A next generation firewall, or NGFW, provides even more security than a state____ firewall. Not only does an NGFW provide state____inspection of incoming and outgoing traffic, but it also performs more in-depth security functions like deep packet inspection and intrusion protection. Some NGFWs connect to cloud-based threat intelligence services so they can quickly update to protect against emerging cyber threats.
9.
FILL IN THE BLANK QUESTION
1 min • 1 pt
When you connect to the internet, your internet service provider receives your network's requests and forwards it to the correct destination server. But your internet requests include your private information. That means if the traffic gets inter_________, someone could potentially connect your internet activity with your ph________ location and your personal information. This includes some information that you want to keep private, like bank accounts and credit card numbers. A virtual private network, also known as a VPN, is a network security service that changes your public ___ address and hides your virtual location so that you can keep your data private when you're using a public network like the internet.
10.
FILL IN THE BLANK QUESTION
1 min • 1 pt
VPNs also encrypt your data as it travels across the internet to preserve confidentiality. A VPN service performs enc___________ on your data in transit. enc___________is a process performed by a VPN service that protects your data by wrapping sensitive data in other data packets. This allows your network requests to reach their destination, but still encrypts your personal data so it's unreadable while in transit. A VPN also uses an encrypted tu________ between your device and the VPN server. The encryption is unhackable without a cryptographic key, so no one can access your data.
Explore all questions with a free account
Similar Resources on Quizizz
13 questions
CyberSecurity

Quiz
•
Professional Development
14 questions
AZ-900 Modulo 2

Quiz
•
KG - Professional Dev...
10 questions
Basic Introduction Of hacking

Quiz
•
Professional Development
12 questions
Quiz sobre Serviços de Rede do Azure

Quiz
•
Professional Development
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
15 questions
CCNA Security Pre-Assessment

Quiz
•
Professional Development
15 questions
15 question Security+ Quiz March 2023

Quiz
•
Professional Development
7 questions
Sec + CH.3 Pre-Assessment

Quiz
•
Professional Development
Popular Resources on Quizizz
17 questions
CAASPP Math Practice 3rd

Quiz
•
3rd Grade
20 questions
math review

Quiz
•
4th Grade
21 questions
6th Grade Math CAASPP Practice

Quiz
•
6th Grade
13 questions
Cinco de mayo

Interactive video
•
6th - 8th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
10 questions
4th Grade Math CAASPP (part 1)

Quiz
•
4th Grade
45 questions
5th Grade CAASPP Math Review

Quiz
•
5th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher

Quiz
•
Professional Development
11 questions
All about me

Quiz
•
Professional Development
10 questions
Simple Past Reading

Passage
•
Professional Development
15 questions
Trivia

Quiz
•
Professional Development
20 questions
General Trivia

Quiz
•
Professional Development
18 questions
The Earth

Passage
•
Professional Development
9 questions
Brain Teasers

Lesson
•
Professional Development
33 questions
Regular Spanish Verb Conjugations

Quiz
•
Professional Development