Chapter 3 Exploring Network Technologies and Tools

Chapter 3 Exploring Network Technologies and Tools

University

20 Qs

quiz-placeholder

Similar activities

SQL Quiz

SQL Quiz

University

18 Qs

Jira

Jira

University

15 Qs

1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni

1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni

University - Professional Development

20 Qs

basisdata1

basisdata1

University

20 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Memory-Mobo-Hard/Software

Memory-Mobo-Hard/Software

University

18 Qs

PARC Linux Basic Part 2

PARC Linux Basic Part 2

University

20 Qs

CSS Pseudo dan CSS Grid System

CSS Pseudo dan CSS Grid System

University

20 Qs

Chapter 3 Exploring Network Technologies and Tools

Chapter 3 Exploring Network Technologies and Tools

Assessment

Quiz

Computers

University

Easy

Created by

sinav hazirlik

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #2: A security analyst needs to make a recommendation for restricting access to certain segments of the network using only data-link layer security. Which of the following controls will the analyst MOST likely recommend?

MAC

ACL

BPDU

ARP

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #3: An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: Check-in/checkout of credentials The ability to use but not know the password Automated password changes Logging of access to credentials Which of the following solutions would meet the requirements?

OAuth 2.0

Secure Enclave

A privileged access management system

An OpenID Connect authentication system

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #4: After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?

A DMZ

A VPN

A VLAN

An ACL

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #5: A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The security administrator isolated the switch on a separate VLAN and set up a patch routine. Which of the following steps should also be taken to harden the smart switch?

Set up an air gap for the switch

Change the default password for the switch

Place the switch in a Faraday cage

Install a cable lock on the switch

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #6: A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP. Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?

Segmentation

Firewall whitelisting

Containment

Isolation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #7: To mitigate the impact of a single VM being compromised by another VM on the same hypervisor, an administrator would like to utilize a technical control to further segregate the traffic. Which of the following solutions would BEST accomplish this objective?

Install a hypervisor firewall to filter east-west traffic.

Add more VLANs to the hypervisor network switches.

Move exposed or vulnerable VMs to the DMZ.

Implement a zero-trust policy and physically segregate the hypervisor servers.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #8: A cybersecurity administrator is using iptables as an enterprise firewall. The administrator created some rules, but the network now seems to be unresponsive. All connections are being dropped by the firewall. Which of the following would be the BEST option to remove the rules?

# iptables -t mangle -X

# iptables -F

# iptables -Z

# iptables -P INPUT -j DROP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?