placeholder image to represent content

Network Security

Quiz by Rachel Hirsch

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1
    A network administrator deploys a firewall that analyzes the header and Hypertext Markup Language (HTML) code in Hypertext Protocol (HTTP) packets to match patterns in a threat database. Consider the types of firewalls and determine which firewall is on the network.
    Router Firewall
    Next Generation Firewall (NGFW)
    Packet Filtering Firewall
    Appliance Firewall
    30s
  • Q2
    Which of the following should NOT be true of rules configured in a firewall?
    Only allow the minimum amount of traffic.
    The rules are processed from top to bottom.
    The final default rule in a firewall is implicit allow.
    The most specific rules should be placed at the top.
    30s
  • Q3
    Which of the following is a weakness that causes security breach when an accidental trigger or intentional exploit occurs?
    Risk
    Exploit
    Threat
    Vulnerability
    30s
  • Q4
    A user is selling large amounts of stolen merchandise online. The user wants to hide the identity of the host machine. What technique will the attacker most likely use to accomplish this?
    Man-in-the-middle
    IP spoofing
    Sniffing attack
    Phishing attack
    30s
  • Q5
    A small company has a single public address assigned by its Internet Service Provider (ISP). Recommend a solution to the company that will control communications for multiple hosts within the private network to communicate using the single public IP address.
    Port forwarding
    Network Address Translation (NAT)
    Dynamic NAT
    Port Address Translation (PAT)
    30s
  • Q6
    What is the name of the physical security device that utilizes a fingerprint, retina, or facial scan to verify identity?
    Smart Cards
    SmartID
    Biometric
    RFID
    30s
  • Q7
    Which of the following can be used to limit access to only one or two people going into the facility at a time?
    Tholian web
    Min cage
    Cloud minder
    Mantrap
    30s
  • Q8
    Which of the following approaches to wireless LAN (WLAN) security involves the use of an authentication server?
    802.1x
    disabling SSID broadcast
    pre-shared key
    MAC address filtering
    30s
  • Q9
    Which wireless security options used TKIP?
    WPA2
    WPA
    WPS
    WEP
    30s
  • Q10
    Which of the following approaches to wireless LAN (WLAN) security requires a matching string of characters to be configured on a WLAN client and a WLAN access point (AP)?
    Pre-shared key
    MAC Address filtering
    802.1x
    Disabling SSID broadcast
    30s

Teachers give this quiz to your class