IAS Finals Reviewer

IAS Finals Reviewer

University

24 Qs

quiz-placeholder

Similar activities

5th Quiz

5th Quiz

University

20 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

ISC2 - CC - Chapter 1 - Module 3

ISC2 - CC - Chapter 1 - Module 3

University

21 Qs

Fundamentals 18 Understanding DDoS Attacks

Fundamentals 18 Understanding DDoS Attacks

9th Grade - University

25 Qs

Firewalls and IPS

Firewalls and IPS

University

21 Qs

Security Technology (Modules 6 - 7)

Security Technology (Modules 6 - 7)

University

25 Qs

UH 1 TLJ XII TKJ

UH 1 TLJ XII TKJ

1st Grade - University

20 Qs

Communication and networks

Communication and networks

University

20 Qs

IAS Finals Reviewer

IAS Finals Reviewer

Assessment

Quiz

Computers

University

Easy

Created by

Kalo ‎

Used 15+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

method by which systems determine whether and how to admit a user into a trusted area of the organization—that is, information systems, restricted areas such as computer rooms, and the entire physical location.

Entry Control
Permission Management
User Authentication
Access Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In information security, a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network.

Firewall
Antivirus
Encryption
Router

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

private data network that uses the public telecommunications infrastructure to create a means for private communication via a tunneling protocol coupled with security procedures

Virtual Protected Network (VPN)
Virtual Public Network (VPN)
Virtual Private Network (VPN)
Virtual Personal Network (VPN)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In general, all access control approaches rely on the following four mechanisms, which represent the four fundamental functions of access control systems:

Identification, Authentication, Authorization,

Accountability

Authentication, Authorization, Auditing, Encryption

Identification, Validation, Permission, Monitoring

Authentication, Authorization, Auditing, Accountability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are architectural implementations of firewalls?

Single Bastion Hosts, Screened Host Firewalls, Screened Subnet Firewalls

Network-based, Host-based, Application-based

Static, Dynamic, Hybrid

Inbound, Outbound, Bothway

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The general term for a system that can both detect and modify its configuration and environment to prevent intrusions. It encompasses the functions of both intrusion detection systems and intrusion prevention technology.

Intrusion Detection and Prevention Service (IDPS)
Intrusion Detection and Prevention Software (IDPS)
Intrusion Detection and Protection System (IDPS)
Intrusion Detection and Prevention System (IDPS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An adverse event in which an attacker attempts to gain entry into an information system or disrupt its normal operations, almost always with the intent to do harm.

Data breach
Phishing attack
Malware infection

Intrusion

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?