Call: 806-350-8324

Quiz Time: Network Security

Mon, 08/08/2016 - 16:34 -- Rachel Cunningham

You may think you know the answers to basic security questions, such as, what is network security? But it is still a good idea to test your knowledge. Small and medium-sized businesses (SMBs) often lack the IT resources of large companies. Network security is accomplished through hardware and software and both must be constantly updated and managed to work together to prevent threats to your computer.

If you are struggling to answer most of the below questions then fill out the free network assessment form linked at the bottom of this quiz.

1. Typically considered second-generation firewall technology. They work in a similar fashion to packet-filtering firewalls, but they operate at the transport and session layers of the OSI model.

A. network firewall
B. application-level firewall
C. personal firewall
D. circuit-level firewall

2. Also known as proxy servers. Works by performing a deep inspection of application data as it traverses the firewall. Rules are set by analyzing client requests and application responses, then enforcing correct application behavior.

A. network firewall
B. circuit-level firewall
C. application-level firewall
D. personal firewall

3. A firewall configuration used to secure hosts on a network segment. In most, the hosts are connected behind a firewall that is connected to a public network like the Internet. Also known as a perimeter network.

A. stateful inspection
B. DNS poisoning
C. MAC address
D. DMZ (demilitarized zone)

4. A comprehensive security product that includes protection against multiple threats. A product typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package.

A. Secure Content Management (SCM)
B. Intrusion detection systems (IDS)
C. Network Access Protection (NAP)
D. Unified Threat Management (UTM)

5. __________ occurs when an attacker is able to intercept a DNS request and respond to the request before the DNS server is able to.

A. Spoofing
B. DNS spoofing
C. DNS poisoning
D. Honeypot

6. A type of software firewall installed on a host and used to protect the host from network-based attacks.

A. Firewall
B. Honey net
C. Host firewall
D. Network firewall

7. The misuse of a network protocol to perpetrate a hoax on a host or a network device.

A. Firewall
B. Spoofing
C. DNS poisoning
D. DNS spoofing

8. The physical or hardware address burned into each NIC.

A. MAC address
B. Spoofing
C. Honey net
D. Padded cell

9. A solution designed to detect unauthorized user activities, attacks, and network compromises.

A. Secure Content Management (SCM)
B. Intrusion prevention systems (IPS)
C. Intrusion detection systems (IDS)
D. Unified Threat Management (UTM)

10. A trap for hackers.

A. firewall
B. spoofing
C. Honeypot
D. Honey net

1. D
2. C
3. D
4. D
5. B
6. C
7. B
8. A
9. C
10. C

Ultimately, network security helps to protect a businesses well being and reputation by keeping customers data safe, complying to mandatory regulatory laws and by preventing any interruption in business.

Click here now for a free network assessment from


Call Today: