Sec Study Quiz 5

Sec Study Quiz 5

Professional Development

48 Qs

quiz-placeholder

Similar activities

Quizz Compition Round3 ( Computer Network & Excel)

Quizz Compition Round3 ( Computer Network & Excel)

Professional Development

50 Qs

Comptia A+ Core 1 Pt.1

Comptia A+ Core 1 Pt.1

University - Professional Development

50 Qs

Comptia A+ Core 1 pt.2

Comptia A+ Core 1 pt.2

University - Professional Development

50 Qs

CompTIAA+ 220-1101 BurningIce (Part 1)

CompTIAA+ 220-1101 BurningIce (Part 1)

Professional Development

50 Qs

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

11th Grade - Professional Development

50 Qs

Phase 3 Wreck your Brain

Phase 3 Wreck your Brain

University - Professional Development

48 Qs

Reti, internet e servizi

Reti, internet e servizi

Professional Development

50 Qs

Cloud Computer v4.0-P2

Cloud Computer v4.0-P2

Professional Development

50 Qs

Sec Study Quiz 5

Sec Study Quiz 5

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Pat Johnson

FREE Resource

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of attack listed in the network diagram section?

SQL Injection

Cross Site Scripting

XML Injection

Phishing

Answer explanation

The correct choice is Phishing because it is NOT a type of attack listed in the network diagram section.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the anonymizer in the network diagram?

To protect the web server

To hide the attacker's identity

To filter out malicious traffic

To store application source code

Answer explanation

The purpose of the anonymizer in the network diagram is to hide the attacker's identity, not to protect the web server, filter out malicious traffic, or store application source code.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the network diagram, where is the application source code repository located?

On the CRM server

On the attacker's tablet

Behind the firewall

Within the web server

Answer explanation

The application source code repository is located behind the firewall, as shown in the network diagram.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What device is directly connected to the internet in the network diagram?

Router

Switch A

Firewall

CRM Server

Answer explanation

The Firewall is directly connected to the internet in the network diagram as it acts as a barrier between the internal network and the internet, controlling incoming and outgoing traffic.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of the WAF in the context of the network diagram?

Web Application Firewall to protect against web-based attacks

Wide Area Filesystem for file sharing

Wireless Access Facility for network access

Workstation Application Function for desktop applications

Answer explanation

The function of the WAF in the context of the network diagram is to act as a Web Application Firewall to protect against web-based attacks.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack is NOT listed in the 'Select type of attack' section?

SQL Injection

Cross Site Scripting

Phishing

Session Hijacking

Answer explanation

The correct choice is Phishing because it is NOT listed in the 'Select type of attack' section.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is placed between the Internet and Switch A to protect the network?

Anonymizer

Firewall

Router

Web Server

Answer explanation

A firewall is placed between the Internet and Switch A to protect the network by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?