Chapter 3 Exploring Network Technologies and Tools

Chapter 3 Exploring Network Technologies and Tools

University

20 Qs

quiz-placeholder

Similar activities

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

Cloud Architecting - Week 5

Cloud Architecting - Week 5

University

20 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Ethical Hacking

Ethical Hacking

University

20 Qs

CQB NTRMS 24

CQB NTRMS 24

University

15 Qs

Computer Security Measure

Computer Security Measure

11th Grade - University

19 Qs

Network Media

Network Media

University

15 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Chapter 3 Exploring Network Technologies and Tools

Chapter 3 Exploring Network Technologies and Tools

Assessment

Quiz

Computers

University

Easy

Created by

sinav hazirlik

Used 7+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #2: A security analyst needs to make a recommendation for restricting access to certain segments of the network using only data-link layer security. Which of the following controls will the analyst MOST likely recommend?

MAC

ACL

BPDU

ARP

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #3: An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: Check-in/checkout of credentials The ability to use but not know the password Automated password changes Logging of access to credentials Which of the following solutions would meet the requirements?

OAuth 2.0

Secure Enclave

A privileged access management system

An OpenID Connect authentication system

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #4: After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?

A DMZ

A VPN

A VLAN

An ACL

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #5: A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The security administrator isolated the switch on a separate VLAN and set up a patch routine. Which of the following steps should also be taken to harden the smart switch?

Set up an air gap for the switch

Change the default password for the switch

Place the switch in a Faraday cage

Install a cable lock on the switch

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #6: A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP. Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?

Segmentation

Firewall whitelisting

Containment

Isolation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #7: To mitigate the impact of a single VM being compromised by another VM on the same hypervisor, an administrator would like to utilize a technical control to further segregate the traffic. Which of the following solutions would BEST accomplish this objective?

Install a hypervisor firewall to filter east-west traffic.

Add more VLANs to the hypervisor network switches.

Move exposed or vulnerable VMs to the DMZ.

Implement a zero-trust policy and physically segregate the hypervisor servers.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Question #8: A cybersecurity administrator is using iptables as an enterprise firewall. The administrator created some rules, but the network now seems to be unresponsive. All connections are being dropped by the firewall. Which of the following would be the BEST option to remove the rules?

# iptables -t mangle -X

# iptables -F

# iptables -Z

# iptables -P INPUT -j DROP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?