Search Header Logo

Network Security Domain 3 Practice Assessment

Authored by Charles Carr

Instructional Technology

10th Grade

Used 3+ times

Network Security Domain 3 Practice Assessment
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

45 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Which are ways to secure wireless networks? Choose three answers.

Place the AP in a server closet

Disable the SSID braodcast

Use MAC Filtering

Place the wireless AP high on a shelf

Change the SSID

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of protocol spoofing redirects a web request to an incorrect website?

IP spoofing

ACL spoofing

HTTP flooding
ARP spoofing
DNS spoofing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using multiple layers of security to protect assets describes what cybersecurity concept?

Defense in Depth

Hardening

Phishing Awareness

Principle of Least Privilege

Network Segmentation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) ________ is a logical network managed on a physical switch.

ARCNET

VLAN
VPN

IPRNET

MAN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The perimeter network is commonly placed where on a network?

At the data center where servers are located.
In the core of the internal network.
On individual user devices within the network.

Between the internal network and the public network.

Between the internal network and a VPN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another name for a DMZ?

Firewall network
Secure zone
Internal network
Public network
Perimeter network

7.

REORDER QUESTION

1 min • 5 pts

Place the steps of Port NAT in the correct order.

The router translates the private Ip address of the packet to a public IP address and new port #

The router updates its NAT table before forwarding the packet to the intended destination.

A internal device sends a packet to a device outside the network

The packet includes the private source IP address and a port number

The router uses the NAT table and port number to send the response back to the correct device

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?