Module 4

Module 4

1st - 5th Grade

13 Qs

quiz-placeholder

Similar activities

Postest Training CCNA KALOS Day-03

Postest Training CCNA KALOS Day-03

3rd Grade

15 Qs

Post-Test Training Mikrotik Day 01

Post-Test Training Mikrotik Day 01

3rd Grade

10 Qs

Computer Fall Review

Computer Fall Review

5th Grade

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Digital Devices

Digital Devices

1st - 12th Grade

15 Qs

Pretest Cisco Day-01

Pretest Cisco Day-01

3rd Grade

15 Qs

Linux-1 Week 6

Linux-1 Week 6

1st - 5th Grade

16 Qs

Pre-Test Training Mikrotik Day 01

Pre-Test Training Mikrotik Day 01

3rd Grade

10 Qs

Module 4

Module 4

Assessment

Quiz

Computers

1st - 5th Grade

Easy

Created by

who areyou

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At what point in the enterprise network are packets arriving from the internet examined prior to entering the network?

Campus Core

Internet Edge

Network Edge

WAN Edge

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)

an IP domain name

a unique hostname

a user account

an enable mode password

an encrypted password

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one difference between using Telnet or SSH to connect to a network device for management purposes?

Telnet uses UDP as the transport protocol whereas SSH uses TCP.

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Telnet supports a host GUI whereas SSH only supports a host CLI.

Telnet does not provide authentication whereas SSH provides authentication

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.)

operating system security

router hardening

physical security

flash security

remote access security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a good password recommendation for a Cisco router?

Use the service password-encryption command to protect a password used to log into a remote device across the network.

Use a minimum of 7 characters.

Zeroize all passwords used.

Use one or more spaces within a multiword phrase.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using a banner message on a Cisco network device?

It can provide more security by slowing down attacks.

It can be used to create a quiet period where remote connections are refused.

It is effective in deflecting threat actors from entering the device.

It can protect the organization from a legal perspective

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

out-of-band access to a switch through the use of a virtual terminal with password authentication

remote access to the switch through the use of a telephone dialup connection

direct access to the switch through the use of a terminal emulation program

on-site access to a switch through the use of a directly connected PC and a console cable

remote access to a switch where data is encrypted during the session

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?