
5.3.2 Review
Quiz by Kwok Louie
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
20 questions
Show answers
- Q1What is one reason why a company might choose to implement a Next-Generation Firewall (NGFW)?It provides advanced features like intrusion prevention and deep packet inspectionIt can only be used for monitoring network trafficIt does not require regular software updatesIt is cheaper to implement than traditional firewalls30s
- Q2What does the term 'default deny' mean in the context of firewall rules?All traffic is allowed unless explicitly deniedIt means that all traffic is blocked unless explicitly allowed by a ruleTraffic is allowed based on the time of dayOnly outgoing traffic is monitored30s
- Q3Which of the following is a common feature of modern firewalls?Only allows traffic from known IP addressesIntrusion detection and prevention capabilitiesIs solely used for network performance monitoringRequires manual updates for every rule30s
- Q4What is the primary function of a firewall in a computer network?To increase the speed of network connectionsTo store data securelyTo monitor and control incoming and outgoing network traffic based on predetermined security rulesTo host web applications30s
- Q5Which type of firewall operates at the application layer of the OSI model?Packet filtering firewallStateful inspection firewallApplication firewallNetwork address translation (NAT) firewall30s
- Q6What is one advantage of using a hardware firewall over a software firewall?It offers better user interface optionsIt provides a dedicated hardware solution that can process and filter traffic more efficientlyIt can only protect a single deviceIt is easier to configure than a software firewall30s
- Q7What is the primary difference between a VPN and a firewall?A VPN is installed on the hardware, while a firewall only exists as softwareA VPN is used for local networks, a firewall is used for cloud networksA VPN encrypts your internet traffic for secure remote access, while a firewall filters and controls incoming and outgoing network traffic.A VPN prevents any traffic while a firewall allows all traffic30s
- Q8What is the primary difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)?An IDS and IPS perform the same functions.An IDS can block attacks while an IPS cannot.An IPS only monitors network traffic without taking action.An IDS monitors and alerts on suspicious activity while an IPS actively blocks it.30s
- Q9What type of alerts does an Intrusion Detection System (IDS) typically generate?Only false positives with no true alerts.Alerts for successful logins only.Alerts based on detected anomalies and potential threats.Only alerts for authenticated users.30s
- Q10Which of the following best describes the deployment location of an Intrusion Prevention System (IPS)?An IPS is typically placed in-line with the network traffic it is protecting.An IPS operates solely on endpoint devices.An IPS is placed in a passive mode, like an IDS.An IPS is usually located outside the firewall.30s
- Q11Which of the following statements about an Intrusion Prevention System (IPS) is true?An IPS requires manual updates for every detected threat.An IPS can drop malicious packets automatically before they reach their destination.An IPS cannot distinguish between legitimate and malicious traffic.An IPS only logs activity without any intervention.30s
- Q12What is a common deployment strategy for an Intrusion Detection System (IDS)?An IDS requires that all network traffic be encrypted.An IDS is often deployed in a passive mode to monitor network traffic without interfering with it.An IDS operates only on specific endpoints.An IDS is always deployed in-line to block traffic.30s
- Q13Which of the following best describes the primary goal of an Intrusion Prevention System (IPS)?To log all network activity without taking action.To actively prevent and block potential security threats in real-time.To provide user authentication and access control.To only alert administrators after an attack has occurred.30s
- Q14What is the main advantage of having both an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) in a network?An IDS performs better when it is the only system in use.Using both is redundant and unnecessary.An IPS alone can detect threats more effectively than an IDS.Combining both systems provides comprehensive security, with monitoring and threat prevention capabilities.30s
- Q15What is the primary purpose of Unified Threat Management (UTM) systems?To provide traditional antivirus softwareTo integrate multiple security functions into a single deviceTo create isolated network segmentsTo monitor user behavior exclusively30s