The DFN5033 Network Security Test Dis 2017 assesses key aspects of network security, focusing on vulnerabilities, risks, and protective measures like firewalls and VPNs. It evaluates understanding of internal threats and the fundamental steps for securing a network, essential for anyone involved in network administration or security.
Criminal element
Hackers
Terrorist
Human
Rate this question:
External threats
Internal threats
Unknown threats
Unstructured threats
Rate this question:
Attack
Exploit
Risk
Vulnerability
Rate this question:
Install a firewall
Install an Intrusion Prevention System
Update servers and user PCs with the latest patches
Develop a security policy
Rate this question:
An optional feature that increases network performance when turned on
The encapsulation of packets inside packets of different protocol to create and maintain the virtual circuit
The method a system administrator uses to detect hackers on the network
A marketing strategy to sell VPN products cheaply in return for expensive service contracts
Rate this question:
An antivirus/antivirus
A firewall
A port
A trojan
Rate this question:
Robust
Expensive
Fast
Scalable
Rate this question:
They operate in promiscuous mode
They have no potential impact on the data segment being monitored
They operate in inline mode
They are more vulnerable to evasion techniques than IDS
Rate this question:
Easy Security Model
Open Security Model
Close Security Model
Restrictive Security Model
Rate this question:
DoS
Logic bomb
Social engineering
Worm
Rate this question:
Password guessing
Social engineering
Man in the middle attack
Sniffing
Rate this question:
Telnet
SSL
SSH
SMTP
Rate this question:
Spyware
Trojan
Virus
Worm
Rate this question:
Dumpster diving
Port scanning
Denial of service
Man in the middle attack
Rate this question:
Scanning
Reconnaissance
Sniffing
Access
Rate this question:
SSL, tunneling
IPSec,SSL
IPSec,tunneling
IPSec,SSH
Rate this question:
Web server
Server Network switch
Database server
File/print server
Rate this question:
DMZ
Honey pot
firewall
New subnet
Rate this question:
To provide security against unauthorized users
To process client requests for Web pages
To process client requests for database access
To provide TCP/IP
Rate this question:
NAT
Proxy
IDS
DMZ
Rate this question:
Packet Filter
Dynamic Network Address Translation (DNAT)
Network Address Translation (NAT)
Proxy Server
Rate this question:
HTTP
POP
SMTP
SNMP
Rate this question:
Network security
Physical security
Buffer Overflow
Ethical Hacking
Rate this question:
Bastion host
Application Server
Firewall Server
Rogue Server
Rate this question:
IP spoofing
MAC Flooding
Phishing
Spammer
Rate this question:
Hackers
Spoofing
Cracking
Mobisodes
Rate this question:
Spam
Virus
Malware
Phish
Rate this question:
An attacker takes advantage of the add/grace period to monopolize names without ever paying for them
Packets are captured, the pertinent information is extracted, and then packets are placed back on the network
An attack that typically involves flooding a listening port on a machine with packets to disrupt the resources
An attacker intercepts traffic and then tricks the parties at both ends into believing that they are communicating with each other
Rate this question:
Encryption
Authentication
Authorization
Non-repudiation
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.