Objective 4.3/Day 10 -
What network hardening technique helps prevent unauthorized access to unused switch ports?
Day 10 Quiz - Physical & Network Security
Quiz
•
Professional Development
•
Professional Development
•
Medium
Robert Teney
Used 3+ times
FREE Resource
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What network hardening technique helps prevent unauthorized access to unused switch ports?
Router Advertisement (RA) Guard
Port security
Dynamic ARP inspection
Control plane policing
Answer explanation
Port Security is used to control access to switch ports by specifying which devices are allowed to connect to each port. Port security features, such as limiting the number of MAC addresses that can be learned on a port or binding specific MAC addresses to a port, help prevent unauthorized devices from accessing the network through unused or inactive ports.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
Which network hardening technique protects against unauthorized access to SNMP data?
Secure SNMP
Private VLANs
Disable unneeded network services
Dynamic ARP inspection
Answer explanation
Secure Simple Network Management Protocol (SNMP) involves using SNMPv3, which provides enhanced security features such as authentication and encryption. This ensures that SNMP data is protected from unauthorized access and eavesdropping by requiring proper credentials and encrypting the data transmitted over the network.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What method should be employed to prevent rogue devices from advertising themselves as routers?
Router Advertisement (RA) Guard
Control plane policing
Disable unneeded switchports
Private VLANs
Answer explanation
Router Advertisement (RA) Guard is used to prevent unauthorized or rogue devices from sending Router Advertisement messages in an IPv6 network. By filtering out or blocking these rogue RA messages, RA Guard helps to protect the network from being disrupted by devices pretending to be legitimate routers.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
Which technique involves restricting the use of unnecessary network protocols and services to reduce the attack surface?
Dynamic ARP inspection
Disable unneeded network services
Port security
Private VLANs
Answer explanation
This technique involves turning off or disabling network services and protocols that are not required for the network's operation. By reducing the number of active services, you minimize potential vulnerabilities and reduce the attack surface that could be exploited by attackers.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What network hardening technique involves modifying passwords to ensure they are not easily guessed or cracked?
Change default VLAN
Password complexity/length
Enable DHCP snooping
Patch and firmware management
Answer explanation
Password complexity/length refers to the practice of setting strong passwords that include a combination of uppercase and lowercase letters, numbers, and special characters, as well as ensuring passwords meet a minimum length requirement. This technique enhances security by making it harder for attackers to guess or crack passwords.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
Which network hardening method helps prevent unauthorized access to network resources based on predefined rules?
Access control list
Role-based access
Change default passwords
Firewall rules
Answer explanation
Access control lists (ACLs) are used to control traffic flow in a network by allowing or denying access to network resources based on predefined rules. By configuring ACLs, administrators can restrict access to specific IP addresses, ports, or protocols, thereby enhancing network security.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What network hardening technique involves regularly updating software and firmware to address known vulnerabilities and security issues?
Patch and firmware management
Enable DHCP snooping
Change default VLAN
Role-based access
Answer explanation
Patch and firmware management is the process of regularly updating software and firmware on network devices to address known vulnerabilities and security issues. By keeping devices up-to-date with the latest patches and firmware releases, organizations can mitigate the risk of exploitation by cyber threats.
30 questions
Pre & Post Test Hypernet - Product Knowledge (NE - 2021)
Quiz
•
Professional Development
22 questions
Tema 4: Infraestructuras de redes
Quiz
•
Professional Development
25 questions
MEM Audit
Quiz
•
Professional Development
25 questions
AWS CSA Prep
Quiz
•
Professional Development
25 questions
PLC and Robotics Quiz
Quiz
•
Professional Development
30 questions
Employability Skills - 1st Year 281-310
Quiz
•
Professional Development
24 questions
Remote Access & Security
Quiz
•
11th Grade - Professi...
28 questions
Permit to work and Lock out tag out Question banks
Quiz
•
Professional Development
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade