Networking Quiz

Networking Quiz

University

10 Qs

quiz-placeholder

Similar activities

Securing Your Identity: MFA Edition

Securing Your Identity: MFA Edition

University

15 Qs

Cisco 2, Module 4

Cisco 2, Module 4

University

15 Qs

cn4 ACL 4.2 4.3

cn4 ACL 4.2 4.3

University

5 Qs

Network Layer

Network Layer

University

15 Qs

CXA - Access Control List

CXA - Access Control List

University

10 Qs

Module 3-Creating Vlans

Module 3-Creating Vlans

9th Grade - University

12 Qs

Quiz 2 (Network Protocol - Module 2)

Quiz 2 (Network Protocol - Module 2)

University

13 Qs

Access Control Quiz

Access Control Quiz

University

15 Qs

Networking Quiz

Networking Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Trung Chi

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does using the service password-encryption command on a router provide additional security?

by encrypting all passwords passing through the router

by encrypting passwords in the plain text configuration file

by requiring entry of encrypted passwords for access to the device

by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges

by automatically suggesting encrypted passwords for use in configuring the router

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When are packets processed by an inbound access list?

before they are routed to an outbound interface

after they are routed to an outbound interface

before and after they are routed to an outbound interface

after they are routed to an outbound interface but before being placed in the outbound queue

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The company internetwork is subnetted using 29 bits. Which wildcard mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?

255.255.255.248

255.255.255.224

0.0.0.224

0.0.0.8

0.0.0.7

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three valid reasons to assign ports to VLANs on a switch? (Choose three.)

to logically group hosts according to function

to increase the size of the collision domain

to increase network security

to isolate broadcast traffic

to make VTP easier to implement

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to establish a secure terminal connection to a remote network device?

SNMPv1

SSH

ARP

WEP

Telnet

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)

source IP address and destination IP address

VLAN number

source switch port number

TCP or UDP port numbers

protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols?

transport output all

transport preferred all

transport type all

transport input all

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?