![placeholder image to represent content](/_next/image?url=%2Fassets%2Fquiz_default_logo.jpg&w=256&q=75)
Network Security
Quiz by Rachel Hirsch
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1A network administrator deploys a firewall that analyzes the header and Hypertext Markup Language (HTML) code in Hypertext Protocol (HTTP) packets to match patterns in a threat database. Consider the types of firewalls and determine which firewall is on the network.Router FirewallNext Generation Firewall (NGFW)Packet Filtering FirewallAppliance Firewall30s
- Q2Which of the following should NOT be true of rules configured in a firewall?Only allow the minimum amount of traffic.The rules are processed from top to bottom.The final default rule in a firewall is implicit allow.The most specific rules should be placed at the top.30s
- Q3Which of the following is a weakness that causes security breach when an accidental trigger or intentional exploit occurs?RiskExploitThreatVulnerability30s
- Q4A user is selling large amounts of stolen merchandise online. The user wants to hide the identity of the host machine. What technique will the attacker most likely use to accomplish this?Man-in-the-middleIP spoofingSniffing attackPhishing attack30s
- Q5A small company has a single public address assigned by its Internet Service Provider (ISP). Recommend a solution to the company that will control communications for multiple hosts within the private network to communicate using the single public IP address.Port forwardingNetwork Address Translation (NAT)Dynamic NATPort Address Translation (PAT)30s
- Q6What is the name of the physical security device that utilizes a fingerprint, retina, or facial scan to verify identity?Smart CardsSmartIDBiometricRFID30s
- Q7Which of the following can be used to limit access to only one or two people going into the facility at a time?Tholian webMin cageCloud minderMantrap30s
- Q8Which of the following approaches to wireless LAN (WLAN) security involves the use of an authentication server?802.1xdisabling SSID broadcastpre-shared keyMAC address filtering30s
- Q9Which wireless security options used TKIP?WPA2WPAWPSWEP30s
- Q10Which of the following approaches to wireless LAN (WLAN) security requires a matching string of characters to be configured on a WLAN client and a WLAN access point (AP)?Pre-shared keyMAC Address filtering802.1xDisabling SSID broadcast30s