How does an intrusion prevention system differ from an intrusion detection system?
Advanced Network Security

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Andrea M Day
Used 12+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An IDS discovers and blocks suspicious activity.
An IDS only blocks suspicious activity, but does not analyze it.
An IDS is only available as software, and not a hardware device
An IDS only sends alerts when suspicious behavior is detected.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Jonathan just purchased a second server so that he can split tasks between the two servers. What term can be used for this system?
Balancing Server
Client-server Model
Distributed Computing
Load Balancer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would not be considered suspicious behavior by an intrusion detection system (IDS)?
A user tries to access a password file
A large amount of data is sent somewhere outside of the network
An employee is on vacation, but somebody is accessing the network from their account
An employee accesses a file they are authorized to view during business hours
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tati's Internet speed has been slow and she would like to spread the incoming Internet traffic across different servers to speed up her system and avoid a server overload. What device can she use to accomplish this?
Intrusion Detection System
Intrusion Prevention System
Load Balance
Unified Threat Management
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are shopping online for a device to help block unwanted Internet traffic. Which device will not accomplish this task?
Firewall
IDS
IPS
UTN
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There have been recent security concerns about too many employees entering the building all at once, using one access card. Which of the following access devices could be used to restrict access to a smaller number of employees at one time?
Checkpoint
Mantrap
Perimeter Zone
Tailgate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technologies uses a person's physical characteristics in order to gain access?
Biometrics
Complex password requirements
Hardware token
Smart Card
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Keamanan Jaringan ( Firewall )

Quiz
•
12th Grade
21 questions
Networks

Quiz
•
10th Grade
20 questions
Wired/wireless/addressing/protocols/layers

Quiz
•
10th Grade
19 questions
WJEC 1.3.1 Communications - Networks and Network Hardware

Quiz
•
9th - 10th Grade
18 questions
WJEC GCSE Computer Science - Security

Quiz
•
9th - 10th Grade
19 questions
Network Security Quiz

Quiz
•
10th Grade
20 questions
Networks

Quiz
•
9th Grade
21 questions
ICT 4 - Networks

Quiz
•
6th - 9th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Computers
25 questions
Spanish preterite verbs (irregular/changed)

Quiz
•
9th - 10th Grade
10 questions
Identify Slope and y-intercept (from equation)

Quiz
•
8th - 9th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
8 questions
"Keeping the City of Venice Afloat" - STAAR Bootcamp, Day 1

Quiz
•
9th - 12th Grade
26 questions
June 19th

Quiz
•
4th - 9th Grade
20 questions
Distance, Midpoint, and Slope

Quiz
•
10th Grade
20 questions
Figurative Language Review

Quiz
•
10th Grade
27 questions
STAAR English 1 Review

Quiz
•
9th Grade