
security modules 10/11 SRWE

Quiz
•
Computers
•
12th Grade
•
Easy
Sandy Thomaschek
Used 2+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is port security and how can it be configured on switches?
Port security is a feature that allows you to restrict input to an interface by limiting and identifying IP addresses of the stations allowed to access the port. It can be configured on switches by enabling it on the interface and setting the maximum number of allowed IP addresses.
Port security is a feature that allows you to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. It can be configured on switches by enabling it on the interface and setting the maximum number of allowed MAC addresses.
Port security is a feature that allows you to restrict output to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. It can be configured on switches by disabling it on the interface and setting the maximum number of allowed MAC addresses.
Port security is a feature that allows you to restrict input and output to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. It can be configured on switches by enabling it on the interface and setting the minimum number of allowed MAC addresses.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Explain the concept of MAC address filtering and how it can be implemented on switches.
MAC address filtering is a security feature that only works for wireless networks
MAC address filtering is a security feature that allows or denies network access based on the MAC address of the device. It can be implemented on switches by configuring a list of allowed or denied MAC addresses in the switch's settings.
MAC address filtering can be implemented on switches by configuring a list of allowed or denied IP addresses
MAC address filtering is a feature that allows filtering based on IP addresses
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is DHCP snooping and how can it be configured on switches?
DHCP snooping is a security feature that filters out unauthorized DHCP messages. It can be configured on switches by enabling DHCP snooping globally and on specific VLANs, and by configuring trusted interfaces.
DHCP snooping is a protocol used for managing IP addresses on a network. It can be configured on switches by enabling DHCP snooping globally and on specific VLANs, and by configuring untrusted interfaces.
DHCP snooping is a feature that enhances network performance by prioritizing DHCP messages. It can be configured on switches by disabling DHCP snooping globally and on specific VLANs, and by configuring untrusted interfaces.
DHCP snooping is a security feature that prevents unauthorized access to the DHCP server. It can be configured on switches by enabling DHCP snooping globally and on all interfaces, and by configuring untrusted VLANs.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does enabling dynamic ARP inspection enhance switch security?
It prevents ARP spoofing attacks
It causes network congestion
It increases the risk of ARP poisoning
It slows down network performance
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the best practices for securing switch management interfaces?
Leaving the default password unchanged
Disabling encryption for faster access
Using strong passwords, enabling encryption, restricting access through ACLs, and regularly updating firmware
Allowing unrestricted access to the management interface
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can port security be used to restrict the number of MAC addresses on a switch port?
By configuring the maximum number of allowed MAC addresses on a switch port.
By configuring the switch port to automatically accept any MAC address
By allowing all MAC addresses to connect to the switch port
By disabling the switch port completely
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describe the process of implementing MAC address filtering to control network access on a switch.
Install a firewall on the switch to block unwanted MAC addresses
Send an email to all network users asking for their MAC addresses
Access the switch's configuration interface and create a list of allowed MAC addresses, then apply the list to specific switch ports.
Unplug all network cables and then re-plug them in random order
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Cisco 2, Module 10

Quiz
•
12th Grade
10 questions
Module 9-Address Resolution Protocol

Quiz
•
9th Grade - Professio...
10 questions
Dante Cert. Level 1- Quiz E: Dante is Standard Networking

Quiz
•
12th Grade
20 questions
Soal Kelas XII TKJ (MikroTik dan Akses Point)

Quiz
•
12th Grade
20 questions
CN-II LINK-1

Quiz
•
12th Grade
12 questions
Networking Review

Quiz
•
KG - University
15 questions
Module 11 - Network Design

Quiz
•
12th Grade
20 questions
Intro Cyber U7 Review Switching & Routing

Quiz
•
12th Grade
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade