Search Header Logo

Network Security Baselines

Authored by Dove Soap

Information Technology (IT)

Professional Development

Used 1+ times

Network Security Baselines
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a primary reason for establishing network security baselines in an organization?

To prevent zero-day attacks by using predefined signatures

To define a minimum standard of security configurations across devices

To enable seamless network integration with third-party vendors

To ensure all network components use identical encryption methods

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How does the Security Content Automation Protocol (SCAP) contribute to network security baseline compliance?

By detecting and removing malware from network endpoints

By enabling automated monitoring and comparison against defined baselines

By providing real-time analysis of network traffic patterns

By enforcing access control policies based on user roles

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which network configuration change can reduce the likelihood of unauthorized access to router management interfaces?

Enabling SNMPv1 for remote monitoring

Using HTTPS and disabling HTTP on management interfaces

Configuring default SNMP community strings

Disabling SSH access to the router

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of using a secure baseline configuration for all organizational assets?

To establish consistent security controls and mitigate common vulnerabilities

To increase network traffic speed and prevent latency

To reduce encryption overhead on network resources

To enable quick data recovery in case of a breach

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be avoided when configuring secure remote access to network devices, due to its lack of encryption?

HTTPS

SNMPv3

Telnet

SSH

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What key information does a heat map provide to network administrators in the context of wireless network management?

List of connected device

Signal strength, interference levels, and channel usage

IP address allocation across wireless access points

Data transfer rates per access point

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which wireless security standard is no longer considered secure and is not recommended for use?

WPA2

WPA3

WEP

WPA2-Personal

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?