Security+ Chapter 5
Start
Congratulations - you have completed Security+ Chapter 5.
You scored %%SCORE%% out of %%TOTAL%%.
Your answers are highlighted below.
Question 1 |
Which technology allows internal hosts to have the IP addresses hidden from the outside?
A | NAT |
B | VSAT |
C | NBAR |
D | BGP |
Question 2 |
A ________ is an security device placed on the network to act as a sensor and alert administrators if an attack is suspected.
A | HIPS |
B | NIPS |
C | NIDS |
D | HIDS |
Question 3 |
Which protocol allows VLANs to be tagged across trunk ports?
A | VTP |
B | 802.1Q |
C | 802.11i |
D | 802.1x |
Question 4 |
What technology allows for groups of users or computers to be segregated within a switch for increased performance and security?
A | Subnet diversity |
B | VLAN |
C | DHCP |
D | ARP |
Question 5 |
What is a network device designed to prevent malicious packets from entering the network, which is commonly referred to as "the first line of defense"?
A | NAC |
B | HIDS |
C | Firewall |
D | HIPS |
Question 6 |
A ________ will go out to the internet and make requests on your behalf.
A | Host based firewall |
B | HIPS |
C | NIPS |
D | Proxy server |
Question 7 |
What is the difference between stateful and and stateless packet filtering?
A | Stateless packet filtering is considered more complex and is only found in the most expensive firewalls |
B | Stateless packet filtering is used to keep a record of connections and use them as a rule |
C | Stateful packet filtering is used to keep a record of connections and use them as a rule |
D | There isn't a difference |
Question 8 |
A ________ is an inline device placed on the network to prevent attacks.
A | NIDS |
B | NIPS |
C | HIPS |
D | HIDS |
Question 9 |
What is placed on a network to lure attackers with the purpose of deflecting attention, learning of the newest attacks, or examining current attack techniques?
A | DMZ |
B | NIDS |
C | Honeypot |
D | Hacker clone |
Question 10 |
What is an area that hangs off of your firewall that is allowed to be accessed by outside users?
A | 802.1q region |
B | VLAN |
C | DMZ |
D | Bastion host |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 10 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!