
Network Security Quiz

Quiz
•
Information Technology (IT)
•
Professional Development
•
Medium
Dove Soap
Used 1+ times
FREE Resource
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following best describes an Intrusion Prevention System (IPS)?
It only monitors network traffic and alerts administrators of potential threats.
It automatically takes action to prevent threats after detecting them.
It blocks network access based on specific port numbers.
It encrypts data being transmitted over the network.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Access Control Lists (ACLs) are commonly implemented to:
Encrypt network traffic between devices
Log all network traffic on a device
Control traffic based on IP addresses, ports, and protocols
Perform URL filtering on outgoing network traffic
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which principle in firewall configuration ensures that unspecified traffic is automatically blocked?
Principle of Least Privilege
Explicit Allow
Implicit Deny
Role-Based Access Control
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a screened subnet, and how does it enhance network security?
A segment isolated by two firewalls to separate public-facing servers from internal systems
A VLAN that restricts access to sensitive data
A subnet that provides secure encryption for traffic
A method for load balancing internal traffic
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which is a main advantage of using Network-Based Intrusion Prevention Systems (NIPS) over Host-Based Intrusion Prevention Systems (HIPS)?
They can detect and prevent local system changes.
They analyze all network traffic for suspicious activity.
They provide more detailed reports on host-specific threats.
They are more effective at preventing local file modifications.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Behavior-based detection in an IDS typically relies on:
Matching packets against known attack signatures
Establishing a baseline of normal activity and detecting deviations
Monitoring for specific IP addresses
Filtering web traffic by URL
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which detection method is more likely to generate false positives due to variations in network traffic?
Signature-based detection
Anomaly-based detection
Protocol filtering
Port scanning
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Quiz on Interaction Techniques and Paradigms in HCI

Quiz
•
Professional Development
15 questions
Mastering Advanced CSS Techniques

Quiz
•
Professional Development
19 questions
Quiz on Loops in Programming

Quiz
•
Professional Development
15 questions
IT Test

Quiz
•
Professional Development
11 questions
intro to computers 11.2 udp and tcp

Quiz
•
Professional Development
20 questions
Topic 1 Question 81 to 100

Quiz
•
Professional Development
15 questions
Sesi 2 MSD 2025 - Security Awareness

Quiz
•
Professional Development
11 questions
QUIZ IT HSSE MONTHLY MEETING - EDISI KEMERDEKAAN

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade