Unified Threat Management (UTM) Appliance Comparison


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which of the following is considered to be a threat to a computer?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Unified threat management focuses on _____.

2. Unified threat management started out as?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

This quiz/worksheet combo quickly and efficiently tests your knowledge of Unified Threat Management (UTM) Systems in information security. Answer questions about what UTM is and look at some examples of it in the corporate world.

Quiz & Worksheet Goals

In this set of questions, you'll assess your understanding of:

  • The focus of UTM
  • Common threats to a computer
  • The origin of UTM

Skills Practiced

  • Reading comprehension - ensure that you draw the most important information from the lesson, such as the type of UTM that deals with objectionable material
  • Information recall - access the knowledge you've gained regarding different threats to computers faced in the modern age
  • Knowledge application - use your knowledge to answer questions about different types and brands of UTM software

Additional Learning

You can find out more about this type of information security by reading the lesson titled Unified Threat Management (UTM) Appliance Comparison. This lesson will explain:

  • Virtual private networks
  • Spam
  • Intrusion detection
  • High-end UTM systems
  • Anti-malware