Day 10 Quiz - Physical & Network Security

Day 10 Quiz - Physical & Network Security

Professional Development

27 Qs

quiz-placeholder

Similar activities

BCS Network Security Test 6

BCS Network Security Test 6

University - Professional Development

24 Qs

Day 8 Quiz - Cloud Concepts & Wireless

Day 8 Quiz - Cloud Concepts & Wireless

Professional Development

26 Qs

Day 5 Quiz - Security Capabilities

Day 5 Quiz - Security Capabilities

Professional Development

27 Qs

BCS Systems & Architecture Quiz 4

BCS Systems & Architecture Quiz 4

University - Professional Development

24 Qs

Google Certified Educator - Level 1

Google Certified Educator - Level 1

Professional Development

27 Qs

Week 2_UMTS

Week 2_UMTS

Professional Development

25 Qs

AWS Training Pre-Test Survey

AWS Training Pre-Test Survey

Professional Development

24 Qs

Day 10 Quiz - Physical & Network Security

Day 10 Quiz - Physical & Network Security

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Robert Teney

Used 3+ times

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 4.3/Day 10 -

What network hardening technique helps prevent unauthorized access to unused switch ports?

Router Advertisement (RA) Guard

Port security

Dynamic ARP inspection

Control plane policing

Answer explanation

Port Security is used to control access to switch ports by specifying which devices are allowed to connect to each port. Port security features, such as limiting the number of MAC addresses that can be learned on a port or binding specific MAC addresses to a port, help prevent unauthorized devices from accessing the network through unused or inactive ports.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 4.3/Day 10 -

Which network hardening technique protects against unauthorized access to SNMP data?

Secure SNMP

Private VLANs

Disable unneeded network services

Dynamic ARP inspection

Answer explanation

Secure Simple Network Management Protocol (SNMP) involves using SNMPv3, which provides enhanced security features such as authentication and encryption. This ensures that SNMP data is protected from unauthorized access and eavesdropping by requiring proper credentials and encrypting the data transmitted over the network.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 4.3/Day 10 -

What method should be employed to prevent rogue devices from advertising themselves as routers?

Router Advertisement (RA) Guard

Control plane policing

Disable unneeded switchports

Private VLANs

Answer explanation

Router Advertisement (RA) Guard is used to prevent unauthorized or rogue devices from sending Router Advertisement messages in an IPv6 network. By filtering out or blocking these rogue RA messages, RA Guard helps to protect the network from being disrupted by devices pretending to be legitimate routers.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 4.3/Day 10 -

Which technique involves restricting the use of unnecessary network protocols and services to reduce the attack surface?

Dynamic ARP inspection

Disable unneeded network services

Port security

Private VLANs

Answer explanation

This technique involves turning off or disabling network services and protocols that are not required for the network's operation. By reducing the number of active services, you minimize potential vulnerabilities and reduce the attack surface that could be exploited by attackers.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 4.3/Day 10 -

What network hardening technique involves modifying passwords to ensure they are not easily guessed or cracked?

Change default VLAN

Password complexity/length

Enable DHCP snooping

Patch and firmware management

Answer explanation

Password complexity/length refers to the practice of setting strong passwords that include a combination of uppercase and lowercase letters, numbers, and special characters, as well as ensuring passwords meet a minimum length requirement. This technique enhances security by making it harder for attackers to guess or crack passwords.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 4.3/Day 10 -

Which network hardening method helps prevent unauthorized access to network resources based on predefined rules?

Access control list

Role-based access

Change default passwords

Firewall rules

Answer explanation

Access control lists (ACLs) are used to control traffic flow in a network by allowing or denying access to network resources based on predefined rules. By configuring ACLs, administrators can restrict access to specific IP addresses, ports, or protocols, thereby enhancing network security.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Objective 4.3/Day 10 -

What network hardening technique involves regularly updating software and firmware to address known vulnerabilities and security issues?

Patch and firmware management

Enable DHCP snooping

Change default VLAN

Role-based access

Answer explanation

Patch and firmware management is the process of regularly updating software and firmware on network devices to address known vulnerabilities and security issues. By keeping devices up-to-date with the latest patches and firmware releases, organizations can mitigate the risk of exploitation by cyber threats.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?