Firewalls and IPS

Firewalls and IPS

University

21 Qs

quiz-placeholder

Similar activities

Review ITE-II

Review ITE-II

University

20 Qs

Networking Elements: GCSE 9-1

Networking Elements: GCSE 9-1

9th Grade - University

20 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

Teknologi Layanan Jaringan-Kelas 12 Ganjil

Teknologi Layanan Jaringan-Kelas 12 Ganjil

University

20 Qs

Computer Security

Computer Security

University

21 Qs

Keamanan Jaringan dan Firewall

Keamanan Jaringan dan Firewall

University

25 Qs

Quiz Jaringan Komputer 2

Quiz Jaringan Komputer 2

10th Grade - University

20 Qs

Firewalls and IPS

Firewalls and IPS

Assessment

Quiz

Computers

University

Medium

Created by

Nina McKee

Used 1+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a firewall in the context of internet connectivity?

To enhance network speed

To create a threat to internal systems

To establish a controlled link between the premises network and the internet

To allow all types of traffic without restrictions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a firewall's role as a perimeter defense?

Allowing unrestricted access to external networks

Creating multiple choke points for enhanced security

Insulating internal systems from external networks

Penetrating the firewall to test its immunity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a critical consideration in the planning and implementation of a firewall?

Ensuring the firewall is penetrable

Specifying a suitable access policy

Allowing unauthorized traffic

Ignoring information security risk assessment

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a firewall access policy include?

Only application protocols

Protocols and IP addresses for specific services

Ignored information from a security risk assessment

Allowing all types of traffic without restrictions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which characteristic is used for controlling access based on considerations such as time, rate of requests, or other activity patterns?

IP address and protocol values

Application protocol

User Identity

Network activity

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A firewall access ________ lists the types of traffic authorized to pass through, including address ranges, protocols, applications, and content types. This ____________ should be developed from the organization’s information security risk assessment and information security _______________.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Characteristics that a firewall access policy could use to filter traffic include IP address and protocol values, application protocol, user identity, and _______________. This type of filtering controls access based on considerations such as time, rate of requests, or other activity patterns.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?