Networking 3/4 Chapter 13 Test Review

Networking 3/4 Chapter 13 Test Review

9th - 12th Grade

28 Qs

quiz-placeholder

Similar activities

Computer Network/Data Communication

Computer Network/Data Communication

11th Grade

23 Qs

ICT3_QUIZ1

ICT3_QUIZ1

11th - 12th Grade

23 Qs

Rate of Reactions

Rate of Reactions

9th Grade

23 Qs

Sonic the Hedgehog Quizizz

Sonic the Hedgehog Quizizz

KG - Professional Development

23 Qs

latihan soal informatika SMALSA

latihan soal informatika SMALSA

10th Grade

25 Qs

Work From Home

Work From Home

12th Grade

25 Qs

Analisis Data Kelas 7

Analisis Data Kelas 7

9th Grade

25 Qs

4. razred TŠRB - KRMIS - SNMP

4. razred TŠRB - KRMIS - SNMP

11th Grade

23 Qs

Networking 3/4 Chapter 13 Test Review

Networking 3/4 Chapter 13 Test Review

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Bradford Scott

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you MOST likely to recommend to the client?

PPP

MS-CHAP

CHAP

EAP

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You are configuring the Local Security Policy on a Windows system. You want to require users to create passwords that are at least 10 characters in length. You also want to prevent login after three unsuccessful login attempts. Which policies should you configure? (Select two.)

Enforce password history

Account lockout threshold

Minimum password length

Password must meet complexity requirements

Maximum password age

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have hired 10 new temporary employees to be with the company for three months. How can you make sure that these users can only log on during regular business hours?

Configure account lockout in Group Policy.

Configure day/time restrictions in user accounts.

Configure account policies in Group Policy.

Configure account expiration in user accounts.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network switch is configured to perform the following validation checks on its ports:

-All ARP requests and responses are intercepted.

-Each intercepted request is verified to ensure that it has a valid IP-to-MAC address binding.

-If the packet has a valid binding, the switch forwards the packet to the appropriate destination.'- If the packet has an invalid binding, the switch drops the ARP packet.

Which security feature was enabled on the switch to accomplish this task?

Dynamic ARP inspection

IGMP snooping

DHCP snooping

Port security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WindowsUpdate.log?

A log file that deploys updates to device groups over a deployment timeline.

A log or record of all notable changes made to a Windows system.

A log file that analyzes Windows Update Service, BITS, and Windows Network Diagnostics Service.

A log file that allows you to see enforced policies on your Windows 10 machine.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following actions typically involve the use of 802.1x authentication? (Select two.)

Authenticating remote access clients.

Controlling access through a router.

Controlling access through a wireless access point.

Controlling access through a switch.

Authenticating VPN users through the internet.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are in the process of implementing a Network Access Protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. The remediation network needs to be isolated from the secure network. Which technology should you implement to accomplish this task?

Port security

Virtual private network (VPN)

Data encryption using PKI

Network segmentation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?