Advanced Network Security

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Andrea M Day
Used 12+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does an intrusion prevention system differ from an intrusion detection system?
An IDS discovers and blocks suspicious activity.
An IDS only blocks suspicious activity, but does not analyze it.
An IDS is only available as software, and not a hardware device
An IDS only sends alerts when suspicious behavior is detected.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jonathan just purchased a second server so that he can split tasks between the two servers. What term can be used for this system?
Balancing Server
Client-server Model
Distributed Computing
Load Balancer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would not be considered suspicious behavior by an intrusion detection system (IDS)?
A user tries to access a password file
A large amount of data is sent somewhere outside of the network
An employee is on vacation, but somebody is accessing the network from their account
An employee accesses a file they are authorized to view during business hours
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tati's Internet speed has been slow and she would like to spread the incoming Internet traffic across different servers to speed up her system and avoid a server overload. What device can she use to accomplish this?
Intrusion Detection System
Intrusion Prevention System
Load Balance
Unified Threat Management
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are shopping online for a device to help block unwanted Internet traffic. Which device will not accomplish this task?
Firewall
IDS
IPS
UTN
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There have been recent security concerns about too many employees entering the building all at once, using one access card. Which of the following access devices could be used to restrict access to a smaller number of employees at one time?
Checkpoint
Mantrap
Perimeter Zone
Tailgate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technologies uses a person's physical characteristics in order to gain access?
Biometrics
Complex password requirements
Hardware token
Smart Card
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Networking Devices Quiz

Quiz
•
11th Grade
18 questions
Cyber EOP - MAC Address By Mr. B

Quiz
•
12th Grade - University
15 questions
Network Quiz

Quiz
•
9th - 11th Grade
24 questions
GCSE Network Topologies and Protocols

Quiz
•
9th - 11th Grade
16 questions
Networking Concepts Quiz

Quiz
•
9th - 12th Grade
19 questions
Computer Science 1.5 - Topologies, Layers and Protocols

Quiz
•
9th - 11th Grade
20 questions
Chapter 4- Networks and the effects of using them

Quiz
•
9th - 10th Grade
20 questions
MAC and IP Addresses

Quiz
•
11th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
CTEA Computer Vocab Terms #1

Quiz
•
12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade