Unit 5 Quiz

Unit 5 Quiz

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

PreTest Software Testing

PreTest Software Testing

9th - 12th Grade

10 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Quiz 9 (15.09.2021)

Quiz 9 (15.09.2021)

1st - 12th Grade

10 Qs

Technology Week HTG Quiz - Monday

Technology Week HTG Quiz - Monday

7th - 12th Grade

10 Qs

Thinglink

Thinglink

9th - 12th Grade

10 Qs

Recording Software Button Identification Quiz

Recording Software Button Identification Quiz

8th Grade - University

10 Qs

Databases

Databases

11th Grade

15 Qs

Data Engineering y BigQuery V1

Data Engineering y BigQuery V1

12th Grade

10 Qs

Unit 5 Quiz

Unit 5 Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Adrian Portillo

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of controls should the network technician review?

Security

Technical

Physical

Administrative

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains why organizations implement security policies and procedures?

To improve hardware performance for all devices

To establish guidelines and rules for protecting data

To enhance user experience on the organization’s devices and network

To optimize software licenses for all members of the organization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary difference between a host-based firewall and a network-based firewall?

The supported operating system

The type of traffic being monitored

The location of deployment

The type of encryption used

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is implementing a new firewall and has hired an IT consultant to evaluate the network. Based on budgetary restrictions implemented by the organization, any firewall that tracks active connections or includes special features like intrusion prevention are not being considered. Therefore, the consultant recommends implementing a firewall that filters traffic at the network level based solely on data found in packet headers (such as IP addresses, ports, and protocols).

Which of the following types of network-based firewalls would best fit the consultant’s recommendations for the organization?

Stateless firewall

Stateful firewall

Next-generation firewall

Host-based firewall

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A technician is trying to prevent a DoS attack on a web server by implementing an Access Control List (ACL) rule. Review the ACL rule configuration.

What impact does this rule have on inbound traffic?

The inbound traffic from the 184.25.44.0/24 network to the web server is being permitted, and all other traffic is also permitted.

The inbound traffic from the 184.25.44.0/24 network to the web server is being denied, and all other traffic is also denied.

The inbound traffic from the 184.25.44.0/24 network to the web server is being denied, but all other traffic is permitted.

The inbound traffic from the 184.25.44.0/24 network to the web server is being permitted, but all other traffic is denied.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains a screened subnet and its benefit to a network?

It is a network segment that connects multiple internal networks and is typically considered a lower security zone.

It is a network segment within an internal network that is isolated from external networks and is typically considered a higher security zone.

It is a network segment that sits between external and internal networks and is typically considered a lower security zone.

It is a network segment that is part of the internal network and is used to store sensitive data, making it a higher security zone.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator receives a notification containing the following system alerts from an IDS and an IPS.

Which of the following alerts could have only originated from an IPS?

Alert: Unauthorized access attempt

Alert: Malware detection

Alert: Blocked malicious traffic

Alert: Unauthorized configuration change

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?