
Module 4

Quiz
•
Computers
•
1st - 5th Grade
•
Easy
who areyou
Used 1+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
At what point in the enterprise network are packets arriving from the internet examined prior to entering the network?
Campus Core
Internet Edge
Network Edge
WAN Edge
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What three configuration steps must be performed to implement SSH access to a router? (Choose three.)
an IP domain name
a unique hostname
a user account
an enable mode password
an encrypted password
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one difference between using Telnet or SSH to connect to a network device for management purposes?
Telnet uses UDP as the transport protocol whereas SSH uses TCP.
Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.
Telnet supports a host GUI whereas SSH only supports a host CLI.
Telnet does not provide authentication whereas SSH provides authentication
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.)
operating system security
router hardening
physical security
flash security
remote access security
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a good password recommendation for a Cisco router?
Use the service password-encryption command to protect a password used to log into a remote device across the network.
Use a minimum of 7 characters.
Zeroize all passwords used.
Use one or more spaces within a multiword phrase.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of using a banner message on a Cisco network device?
It can provide more security by slowing down attacks.
It can be used to create a quiet period where remote connections are refused.
It is effective in deflecting threat actors from entering the device.
It can protect the organization from a legal perspective
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?
out-of-band access to a switch through the use of a virtual terminal with password authentication
remote access to the switch through the use of a telephone dialup connection
direct access to the switch through the use of a terminal emulation program
on-site access to a switch through the use of a directly connected PC and a console cable
remote access to a switch where data is encrypted during the session
Create a free account and access millions of resources
Similar Resources on Wayground
9 questions
types of network

Quiz
•
1st - 10th Grade
10 questions
Level 5 Network Connections Quiz

Quiz
•
5th Grade
15 questions
Networks 1

Quiz
•
3rd - 4th Grade
15 questions
CCNA 200-301 ACL + NAT

Quiz
•
1st - 12th Grade
10 questions
Internet Safety

Quiz
•
KG - 5th Grade
11 questions
36-46 NETWORK+

Quiz
•
1st Grade
10 questions
Network Device

Quiz
•
5th Grade
10 questions
CCNA - SRWE&ENSA - Cap13-16

Quiz
•
1st - 3rd Grade
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Computers
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
9 questions
A Fine, Fine School Comprehension

Quiz
•
3rd Grade
10 questions
Common Denominators

Quiz
•
5th Grade
24 questions
Flinn Lab Safety Quiz

Quiz
•
5th - 8th Grade
12 questions
Passport Quiz 1

Quiz
•
1st - 5th Grade
10 questions
Making Predictions

Quiz
•
4th - 5th Grade
6 questions
Spiral Review 8/5

Quiz
•
4th Grade