Search Header Logo
CCNA1 L16 Network security Fundamentals

CCNA1 L16 Network security Fundamentals

Assessment

Presentation

Computers

University

Practice Problem

Easy

Created by

Jerry Jackson Bent

Used 1+ times

FREE Resource

34 Slides • 18 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

media

8

media

9

Multiple Choice

Why is it important to understand network security fundamentals in today's digital world?

1

To improve internet speed

2

To protect sensitive data from cyber threats

3

To reduce hardware costs

4

To increase the number of devices on a network

10

Open Ended

Explain how an unauthorized intrusion can impact an organization’s network and its operations.

11

Multiple Select

Which of the following are examples of information theft as described ? (Select 2)

1

Stealing proprietary research data

2

Changing the price of an item in a records system

3

Obtaining legal documents using someone else's information

4

Preventing users from accessing network services

12

Fill in the Blanks

Type answer...

13

media

14

media

15

media

16

media

17

Multiple Choice

Which of the following is NOT one of the three primary types of vulnerabilities described in the lesson?

1

Technological vulnerabilities

2

Configuration vulnerabilities

3

Physical vulnerabilities

4

Security policy vulnerabilities

18

Multiple Choice

Which of the following are considered technological vulnerabilities?

1

TCP/IP Protocol Weakness

2

Unsecured user accounts

3

Lack of written security policy

19

Open Ended

Explain how configuration vulnerabilities can expose a network to security threats. Provide at least two examples from the lesson.

20

Fill in the Blanks

Type answer...

21

media

22

media

23

media

24

media

25

media

26

Open Ended

List and briefly describe the four classes of physical threats to network security mentioned in the lesson.

27

Multiple Choice

Which of the following best describes malware?

1

A type of hardware failure

2

A code or software designed to damage, disrupt, or steal data

3

A network configuration setting

4

A physical security threat

28

Multiple Choice

Which of the following statements best describes how a computer virus spreads?

1

By replicating itself without user intervention

2

By attaching itself to an executable file and spreading when the file is run

3

By exploiting network vulnerabilities to travel unaided

29

Multiple Select

Which of the following are characteristics of Trojan horses? (Choose 3)

1

They look legitimate to users

2

They replicate themselves without user interaction

3

They create back doors for unauthorized access

4

They require user interaction to spread

30

media

31

media

32

media

33

media

34

media

35

Multiple Choice

What are the three major categories of network attacks ?

1

Reconnaissance attacks, Access attacks, Denial of service

2

Phishing, Spoofing, Sniffing

3

Malware, Spyware, Adware

36

Fill in the Blanks

Type answer...

37

Multiple Choice

Which of the following best describes the purpose of a port scan ?

1

To identify open ports on active IP addresses for potential exploitation

2

To encrypt data between two endpoints

3

To monitor employee internet usage

38

media

39

media

40

media

41

media

42

Multiple Select

Which of the following are methods used by threat actors to perform password attacks? (Choose 3)

1

Brute-force attacks

2

Trojan horse attacks

3

Packet sniffers

4

SQL injection

43

Multiple Choice

What is the main objective of a man-in-the-middle attack as illustrated in the diagram?

1

To intercept and potentially alter communication between two parties

2

To steal passwords using brute-force methods

3

To redirect network traffic to a fake website

4

To overload a server with traffic

44

media

45

media

46

media

47

media

48

media

49

media

50

media

51

Multiple Choice

Which of the following is a key objective when securing network devices?

1

To increase network speed

2

To configure device hardening features to mitigate security threats

3

To reduce the cost of hardware

4

To improve user interface design

52

media
media

Show answer

Auto Play

Slide 1 / 52

SLIDE