Network Security 6

Network Security 6

Professional Development

20 Qs

quiz-placeholder

Similar activities

Comptia network plus

Comptia network plus

12th Grade - Professional Development

20 Qs

Finale

Finale

Professional Development

24 Qs

It's QUIZ Time 12th March

It's QUIZ Time 12th March

KG - Professional Development

15 Qs

DOMAIN 4 - Communications & Network Security

DOMAIN 4 - Communications & Network Security

Professional Development

21 Qs

Chapter 5: Network Security and Monitoring

Chapter 5: Network Security and Monitoring

University - Professional Development

15 Qs

MA 500 Week 3

MA 500 Week 3

Professional Development

20 Qs

Conficker

Conficker

KG - Professional Development

15 Qs

OP/ODN Engg Course Exam

OP/ODN Engg Course Exam

Professional Development

24 Qs

Network Security 6

Network Security 6

Assessment

Quiz

Other

Professional Development

Hard

Created by

samuel Ekundare

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is the secure port number for SMTP

21

22

587

25

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

one of the ways you can restrict access to port on a network is through the use of __

Network Access Point

Network Access Correction

Network Access Control

Network Access

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Sync Flood Attack the attacker will continuosly flood the target server with a Sync Ack till the server is overwhelmed

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Smurf Attack is same as Ping flood attack

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ARP is used to determine IP address from a known Mac address

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a Network Access Control?

To restrict access to specific ports

To correct network access issues

To provide network access points

To control network access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Honeynet contains the exact same information as the main network. the only difference is that it is intended to distract the attacker from the main network

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?