1) Half-Duplex on a NIC: Fail Open or Fail Close? a) Fail-Open b) Fail-Close 2) What is a weakness of overly relying on an IDS (Intrusion Detection System)? a) It can only detect known attacks b) It is not Vlatman c) It does not offer protection from zero-day attacks d) It cannot monitor encrypted traffic 3) An IPS (Intrusion Prevention System) differs from an IDS in that it: a) Detects and alerts about attacks but does not take action b) Analyzes traffic for trends and generates reports c) Actively blocks malicious traffic in real-time d) Requires constant human monitoring 4) In terms of Network Appliances and Sensors, which of the following would typically be used to monitor network traffic for potential threats and attacks? a) Firewall b) IDS/IPS c) Proxy Server d) Jump Server 5) A Jump Server is commonly used for which of the following purposes in a secure network environment? a) To allow users to bypass firewalls b) To securely access and manage devices in different security zones c) To store sensitive data securely d) To act as a proxy between users and the internet 6) Which of the following is the main concern with the Attack Surface of a network? a) It refers to the physical and software boundaries that need protection b) It represents all the potential points of exploitation c) It is the surface area where physical attacks can occur d) It indicates the number of IDS sensors required to monitor a network 7) Security Zones in a network are used to: a) Create isolated environments for different network traffic types b) Facilitate ease of use for end users c) Allow uncontrolled communication across the network d) Automate the configuration of network firewalls 8) Failure Modes in the context of network devices and appliances refer to: a) The specific actions devices take after a security breach b) The different ways a device can stop working or malfunction c) A protocol for detecting attacks on devices d) The configuration settings for devices to avoid failure 9) Which of the following best describes a Proxy Server in a network? a) A server that monitors all traffic for malware b) A server that acts as an intermediary between a user and the internet to provide filtering, logging, and security c) A device that generates network alerts based on predefined rules d) A server used for backup of critical network systems 10) Which of the following is an example of Device Attributes in a security context? a) Device model and firmware version b) Device's physical location c) Device’s connection speed d) Device’s MAC address

Leaderboard

Visual style

Options

Switch template

Continue editing: ?