Quiz: Module 09 Infrastructure Security
Which of the following is NOT true about VPNs?
A full tunnel routes only some traffic over the secure VPN.
Which firewall rule action implicitly denies all other traffic unless explicitly allowed?
Allow
Ada is researching DDoS mitigations for her company. Which of the following should Ada consider?
DNS Sinkhole
Which of the following is NOT used to create a web filtering block rule?
DNS polling
Which of the following is found on live production systems?
Honeytoken
Iben is preparing a presentation about DMZs. Which of the following would NOT be a true statement regarding a DMZ?
It contains servers that are used only by trusted internal users.
Which firewall allows for the most advanced traffic filtering?
Layer 7 firewall
Which of the following is NOT software-based security protection for an infrastructure network?
RDR
Which of the following is NOT an example of infrastructure security hardware that can be used for protecting a network?
Switch
Which of these appliances provides the broadest protection by combining several security functions?
UTM
What is the advantage of XDR over EDR?
XDR collects and correlates data across various network appliances.
Which of the following is NOT true about zero trust?
Zero trust is designed to make a system trusted.
Tuva is documenting the different types of web filtering software her organization is using for scanning. Which of the following is NOT a type of web filtering scanning she would document?
decentralized proxy scanning
Which of the following is NOT a common network device that can be configured to provide a degree of security protection?
endpoint
What is a virtual firewall?
firewall that runs in the cloud
Which device intercepts internal user requests and then processes those requests on behalf of the users?
forward proxy server
Maya is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Maya consider purchasing that supports her need?
policy-based firewall
Which of the following devices routes requests coming from an external network to the correct internal server?
reverse proxy server
Oda needs to configure the VPN to preserve bandwidth. Which configuration would she choose?
split tunnel
Astri is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?
stateful packet filtering