Day 10 Quiz - Physical & Network Security

Quiz
•
Professional Development
•
Professional Development
•
Medium
Robert Teney
Used 3+ times
FREE Resource
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What network hardening technique helps prevent unauthorized access to unused switch ports?
Router Advertisement (RA) Guard
Port security
Dynamic ARP inspection
Control plane policing
Answer explanation
Port Security is used to control access to switch ports by specifying which devices are allowed to connect to each port. Port security features, such as limiting the number of MAC addresses that can be learned on a port or binding specific MAC addresses to a port, help prevent unauthorized devices from accessing the network through unused or inactive ports.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
Which network hardening technique protects against unauthorized access to SNMP data?
Secure SNMP
Private VLANs
Disable unneeded network services
Dynamic ARP inspection
Answer explanation
Secure Simple Network Management Protocol (SNMP) involves using SNMPv3, which provides enhanced security features such as authentication and encryption. This ensures that SNMP data is protected from unauthorized access and eavesdropping by requiring proper credentials and encrypting the data transmitted over the network.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What method should be employed to prevent rogue devices from advertising themselves as routers?
Router Advertisement (RA) Guard
Control plane policing
Disable unneeded switchports
Private VLANs
Answer explanation
Router Advertisement (RA) Guard is used to prevent unauthorized or rogue devices from sending Router Advertisement messages in an IPv6 network. By filtering out or blocking these rogue RA messages, RA Guard helps to protect the network from being disrupted by devices pretending to be legitimate routers.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
Which technique involves restricting the use of unnecessary network protocols and services to reduce the attack surface?
Dynamic ARP inspection
Disable unneeded network services
Port security
Private VLANs
Answer explanation
This technique involves turning off or disabling network services and protocols that are not required for the network's operation. By reducing the number of active services, you minimize potential vulnerabilities and reduce the attack surface that could be exploited by attackers.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What network hardening technique involves modifying passwords to ensure they are not easily guessed or cracked?
Change default VLAN
Password complexity/length
Enable DHCP snooping
Patch and firmware management
Answer explanation
Password complexity/length refers to the practice of setting strong passwords that include a combination of uppercase and lowercase letters, numbers, and special characters, as well as ensuring passwords meet a minimum length requirement. This technique enhances security by making it harder for attackers to guess or crack passwords.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
Which network hardening method helps prevent unauthorized access to network resources based on predefined rules?
Access control list
Role-based access
Change default passwords
Firewall rules
Answer explanation
Access control lists (ACLs) are used to control traffic flow in a network by allowing or denying access to network resources based on predefined rules. By configuring ACLs, administrators can restrict access to specific IP addresses, ports, or protocols, thereby enhancing network security.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What network hardening technique involves regularly updating software and firmware to address known vulnerabilities and security issues?
Patch and firmware management
Enable DHCP snooping
Change default VLAN
Role-based access
Answer explanation
Patch and firmware management is the process of regularly updating software and firmware on network devices to address known vulnerabilities and security issues. By keeping devices up-to-date with the latest patches and firmware releases, organizations can mitigate the risk of exploitation by cyber threats.
Create a free account and access millions of resources
Similar Resources on Wayground
24 questions
Remote Access & Security

Quiz
•
11th Grade - Professi...
24 questions
AWS Training Pre-Test Survey

Quiz
•
Professional Development
23 questions
Google Quiz

Quiz
•
Professional Development
25 questions
AWS Training Pre-Test Survey 7 August 2024

Quiz
•
Professional Development
22 questions
BCS Network Security Test 8

Quiz
•
University - Professi...
25 questions
Resume Quiz

Quiz
•
Professional Development
24 questions
BCS Network Security Test 6

Quiz
•
University - Professi...
27 questions
Day 5 Quiz - Security Capabilities

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade