Network Device Vulnerabilities

Network Device Vulnerabilities

University

10 Qs

quiz-placeholder

Similar activities

Quiz #2

Quiz #2

University

15 Qs

Table,Image formatting

Table,Image formatting

5th Grade - University

15 Qs

QUIZ-1 KELAS XI

QUIZ-1 KELAS XI

University

10 Qs

Network Technology (BSIT 4)

Network Technology (BSIT 4)

University

12 Qs

Kuis JKI Kelas 8 Pertemuan Ke 2

Kuis JKI Kelas 8 Pertemuan Ke 2

8th Grade - University

10 Qs

2.2 Method of Data Transmission

2.2 Method of Data Transmission

University

13 Qs

Quiz Layanan Dasar VoIP

Quiz Layanan Dasar VoIP

12th Grade - University

14 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Network Device Vulnerabilities

Network Device Vulnerabilities

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Christian Peña

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols should be disabled on a critical network device such as a router?

TCP/IP

ICMP

IPX/SPX

RIP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What feature of a network device, such as a router or switch, can control access permissions for network data?

DNS protocol

Firmware update

Firewall

Access control lists

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which zone of a network security topology should contain your Internet servers, such as web, FTP, and e-mail servers?

DMZ

VLAN

VPN

Intranet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network service allows internal addresses to be hidden from outside networks and allows several internal hosts to use the same external address?

NAT

VPN

VLAN

IP spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What networking technology would be used to divide an internal network into smaller, more manageable, logical segments?

NAT

Tunneling

VPN

VLAN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been tasked to cable the network backbone of a new section of a manufacturing plant. Which of the following is the most secure type of cable to use for this environment?

10BaseT

Cat3

Cat5

Fiber-optic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a DoS attack, a network administrator blocks the source IP with the firewall, but the attack continues. What is the most likely cause of the problem?

The DoS worm has already infected locally.

The attack is coming from multiple, distributed hosts.

A firewall can’t block DoS attacks.

Anti-virus software needs to be installed on the target server.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?