Module 6 Quiz Intrusion and Intrusion Prevention

Module 6 Quiz Intrusion and Intrusion Prevention

10th Grade

10 Qs

quiz-placeholder

Similar activities

08.02.23

08.02.23

University

10 Qs

module 2 part 1 - E-com

module 2 part 1 - E-com

12th Grade

13 Qs

A & R Weekly Quiz Week 5

A & R Weekly Quiz Week 5

University

15 Qs

Tugas Diklat

Tugas Diklat

12th Grade

6 Qs

Dance Program Marketing

Dance Program Marketing

12th Grade

10 Qs

Module 6 Quiz Intrusion and Intrusion Prevention

Module 6 Quiz Intrusion and Intrusion Prevention

Assessment

Quiz

Arts

10th Grade

Hard

Created by

Angela May

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

How do SSL/TLS proxy servers help monitor network traffic?

They decrypt encrypted packages and analyze them for malware

They scan traffic from SSH encryption for malware

They detect irregularities in behavior

They do all of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security policies should not only contain a security game plan for the IT team to follow, but also guidelines and training for employees on how to maintain security.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an ACL?

Access Control List

Anti Corruption List

Asset Collection List

There is no such thing in InDesign.

Attack Control List

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A single-source approach to port scan detection searches for attacks from a single source, whereas a distributed approach detects coordinated attacks from multiple sources.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hypervisor?

It is a server that monitors a network

It is a virtual machine monitor that allows you to host multiple virtual networks

It is a virtual operating system

It is not related to cybersecurity

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the advantages of network segmentation?

It protects sensitive data

It limits damage by isolating segments

It improves speed by diverting traffic at the source

It increases visibility of all content by sharing information across segments

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the function of email traps?

They are used to search for malware in emails

They are used to detect SQL injection attacks

They are used to lure spammers with the intention of blocking traffic coming from their IP address

They are used to carry out phishing attacks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?