CR2241 - Chapter 7

A quiz-themed illustration featuring elements of network security, such as padlocks, servers, and digital connections, in a modern tech setting.

Network Security Knowledge Quiz

Test your understanding of network security concepts and protocols with this comprehensive quiz. Covering topics such as cloud computing, DNS security, and secure communication protocols, this quiz will challenge your knowledge and help you identify areas for improvement.

Key Features:

  • 20 multiple choice questions
  • Focus on security protocols and systems
  • Instant feedback on your answers
20 Questions5 MinutesCreated by SecureLion423
Which of the following TCP/IP protocols do not relate to security?
IP
SNMP
HTTPS
FTP
Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?
It is fully supported in BIND9
It adds additional resource records
It adds message header information.
It can prevent a DNS transfer attack.
What is the recommended secure protocol for voice and video applications?
Secure Real-time Transport Protocol (SRTP)
Hypertext Transport Protocol Secure (HTTPS)
Network Time Protocol (NTP)
Secure/Multipurpose Internet Mail Extensions (S/MIME)
Which type of log can provide details regarding requests for specific files on a system?
Audit Log
Event Log
Access Log
SysFile Log
Which type of device log contains the most beneficial security data?
Firewall log
Email log
Switch log
Router log
Which type of cloud is offered to specific organizations that have common concerns?
Public cloud
Hybrid cloud
Private cloud
Community cloud
Which of these is NOT correct about an SSL accelerator?
It can be a separate hardware card that inserts into a web server.
It can be a separate hardware module.
It should reside between the user’s device and the web servers.
It can only handle the SSL protocol.
Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?
Network tap
Port mirroring
Aggregation switch
Correlation engine
Which version of Simple Network Management Protocol (SNMP) is considered the most secure?
SNMPv2
SNMPv3
SNMPv4
SNMPv5
Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?
DNS replay
DNS masking
DNS poisoning
DNS forwarding
Which of these is the most secure protocol for transferring files?
FTPS
TCP
SFTP
FTP
Which of the following can be used to prevent a buffer overflow attack?
DEP
FIM
VPN
DNS
Which of the following is NOT a service model in cloud computing?
Software as a Service (SaaS)
Hardware as a Service (HaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?
Suspicious outbound connections
IP addresses that are being rejected and dropped
Successful logins
IP addresses that are being rejected and dropped
Which type of hypervisor does not run on an underlying operating system?
TYPE I
TYPE II
TYPE III
TYPE IV
Which application stores the user’s desktop inside a virtual machine that resides on a server and is accessible from multiple locations?
Application cell
Container
VDE
VDI
Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?
Virtual services
Off-premises
On-premises
Hosted services
DNSSEC adds additional and message header information, which can be used to verify that the requested data has not been altered in transmission.
Resource Records
Field Flags
Hash Sequences
Zone Transfers
What functions of a switch does a software defined network separate?
Host and virtual
Control plane and physical plane
RAM and hard drive
Network level and resource level
Which of the following is NOT a security concern of virtualized environments?
Virtual machines must be protected from both the outside world and from other virtual machines on the same physical computer.
Physical security appliances are not always designed to protect virtual systems.
Virtual servers are less expensive than their physical counterparts.
Live migration can immediately move one virtualized server to another hypervisor.
{"name":"CR2241 - Chapter 7", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your understanding of network security concepts and protocols with this comprehensive quiz. Covering topics such as cloud computing, DNS security, and secure communication protocols, this quiz will challenge your knowledge and help you identify areas for improvement.Key Features:20 multiple choice questionsFocus on security protocols and systemsInstant feedback on your answers","img":"https:/images/course2.png"}
Powered by: Quiz Maker