Network Configuration Quiz

Network Configuration Quiz

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Operating System(2)

Operating System(2)

10th Grade - University

10 Qs

KUIS BAB 3

KUIS BAB 3

7th Grade - University

10 Qs

ASESSMEN INSTALLASI JARINGAN KABEL DAN NIRKABEL

ASESSMEN INSTALLASI JARINGAN KABEL DAN NIRKABEL

11th Grade

10 Qs

VPN - Kons 1 - XII TKJ

VPN - Kons 1 - XII TKJ

12th Grade

10 Qs

Quiz Produktif

Quiz Produktif

12th Grade

10 Qs

01mcb

01mcb

12th Grade - University

15 Qs

ASAS INFORMATIKA IX 2425

ASAS INFORMATIKA IX 2425

9th Grade

12 Qs

ACTIVITY TIME~

ACTIVITY TIME~

12th Grade

10 Qs

Network Configuration Quiz

Network Configuration Quiz

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Created by

Adrian Portillo

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

How does a switch determine which port to send a frame to?

The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of all physical ports. If not found, it will send the frame out of the first physical port.

The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of the corresponding physical port. If not found, it will send the frame out of all other physical ports

The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of the first physical port. If not found, it will send the frame out of all physical ports.

The switch looks up the destination MAC address in the CAM table. If found, it will send the frame out of the corresponding physical port. If not found, it will send the frame out of the first physical port.

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A network technician is configuring VLANs on a new network. What is one performance benefit of this approach?

Traffic on the network is encrypted

Latency on the network is increased

Physical security on the network is increased.

Messages sent on the network may reach their destinations faster.

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A technician has reviewed a network log and discovered a potential MAC spoofing attack. Which of the following attacker tactics did the technician most likely identify?

The attacker masked their port with another port on the network.

The attacker mimicked their MAC address with another device’s MAC address on the network.

The attacker filled a switch’s MAC address table with fake entries.

The attacker masked their IP address with another device’s IP address on the network.

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A network administrator is tasked with securing a network’s switch. The following requirements must be met. Authorized devices are allowed to connect to the network via a physical port on the switch. Unauthorized device connections will be dropped if attempting to connect to the network via a physical port on the switch. Which of the following best explains how the switch’s port security should be configured?

The physical ports on the switch should be configured to up to allow all authorized device network traffic.

The physical ports on the switch should be configured to up but only allow a specific set of IP addresses.

The physical ports on the switch should be configured to up but only allow a specific set of MAC addresses.

The physical ports on the switch should be configured to up and only allow known device names.

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A network engineer is configuring a server to support encrypted remote access on port 22. Which of the following protocols should the network engineer use to access a device on the remote server?

RDP

SSH

SFTP

Telnet

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following best describes the purpose of the POP3 application layer protocol?

Client retrieval of email messages from a mail server on default port 143.

Client sending of email messages to a mail server on default port 110.

Client sending of email messages to a mail server on default port 143.

Client retrieval of email messages from a mail server on default port 110.

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Review the following log file.

2024-10-24 14:43:10 INFO [SSH] Connection established from 192.168.1.10 to 192.168.1.20

2024-10-24 14:43:12 INFO [SSH] User 'gilbert' authenticated successfully

2024-10-24 14:43:14 INFO [SFTP] File upload initiated from 192.168.1.10 to 192.168.1.20:/home/gilbert/uploads 2024-10-24 14:43:16 INFO [SFTP] File 'report.pdf' uploaded successfully to /home/gilbert/uploads

Which of the following TCP/IP model layers are associated with the protocols in the log files?

Application

Transport

Internet

Network

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?