
CCNA1 L16 Network security Fundamentals
Presentation
•
Computers
•
University
•
Practice Problem
•
Easy
Jerry Jackson Bent
Used 1+ times
FREE Resource
34 Slides • 18 Questions
1
2
3
4
5
6
7
8
9
Multiple Choice
Why is it important to understand network security fundamentals in today's digital world?
To improve internet speed
To protect sensitive data from cyber threats
To reduce hardware costs
To increase the number of devices on a network
10
Open Ended
Explain how an unauthorized intrusion can impact an organization’s network and its operations.
11
Multiple Select
Which of the following are examples of information theft as described ? (Select 2)
Stealing proprietary research data
Changing the price of an item in a records system
Obtaining legal documents using someone else's information
Preventing users from accessing network services
12
Fill in the Blanks
Type answer...
13
14
15
16
17
Multiple Choice
Which of the following is NOT one of the three primary types of vulnerabilities described in the lesson?
Technological vulnerabilities
Configuration vulnerabilities
Physical vulnerabilities
Security policy vulnerabilities
18
Multiple Choice
Which of the following are considered technological vulnerabilities?
TCP/IP Protocol Weakness
Unsecured user accounts
Lack of written security policy
19
Open Ended
Explain how configuration vulnerabilities can expose a network to security threats. Provide at least two examples from the lesson.
20
Fill in the Blanks
Type answer...
21
22
23
24
25
26
Open Ended
List and briefly describe the four classes of physical threats to network security mentioned in the lesson.
27
Multiple Choice
Which of the following best describes malware?
A type of hardware failure
A code or software designed to damage, disrupt, or steal data
A network configuration setting
A physical security threat
28
Multiple Choice
Which of the following statements best describes how a computer virus spreads?
By replicating itself without user intervention
By attaching itself to an executable file and spreading when the file is run
By exploiting network vulnerabilities to travel unaided
29
Multiple Select
Which of the following are characteristics of Trojan horses? (Choose 3)
They look legitimate to users
They replicate themselves without user interaction
They create back doors for unauthorized access
They require user interaction to spread
30
31
32
33
34
35
Multiple Choice
What are the three major categories of network attacks ?
Reconnaissance attacks, Access attacks, Denial of service
Phishing, Spoofing, Sniffing
Malware, Spyware, Adware
36
Fill in the Blanks
Type answer...
37
Multiple Choice
Which of the following best describes the purpose of a port scan ?
To identify open ports on active IP addresses for potential exploitation
To encrypt data between two endpoints
To monitor employee internet usage
38
39
40
41
42
Multiple Select
Which of the following are methods used by threat actors to perform password attacks? (Choose 3)
Brute-force attacks
Trojan horse attacks
Packet sniffers
SQL injection
43
Multiple Choice
What is the main objective of a man-in-the-middle attack as illustrated in the diagram?
To intercept and potentially alter communication between two parties
To steal passwords using brute-force methods
To redirect network traffic to a fake website
To overload a server with traffic
44
45
46
47
48
49
50
51
Multiple Choice
Which of the following is a key objective when securing network devices?
To increase network speed
To configure device hardening features to mitigate security threats
To reduce the cost of hardware
To improve user interface design
52
Show answer
Auto Play
Slide 1 / 52
SLIDE
Similar Resources on Wayground
46 questions
แบบทดสอบหลังเรียน 662-202 Chap_5-10
Presentation
•
University
48 questions
CS124 - Programming Language - Operators, Expressions and As
Presentation
•
University
50 questions
CE 11,12,13 Prinsip, Praktik, & Proses Pertahanan Jaringan
Presentation
•
University
44 questions
Cyber Security, PwC & Ada
Presentation
•
University
50 questions
DCS2103- Week 12 (Objects and Classes)
Presentation
•
University
51 questions
Bipolar Junction Transistor
Presentation
•
University
50 questions
Ujian Microsoft Word 2025
Presentation
•
University
45 questions
Module 2 - Purposive Comm.
Presentation
•
University
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade