Network Security and Protocols Quiz
Quiz
•
Information Technology (IT)
•
Professional Development
•
Practice Problem
•
Medium
Adrian Henderson
Used 1+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a network administrator and tasked with securing all switches in the company network. What is the most effective step to prevent unauthorized access through unused switch ports?
Enable all switch ports for redundancy
Disable unused ports and place them in a shutdown state
Set up port forwarding on all open ports
Enable dynamic port allocation on unused ports
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization is implementing 802.1X to improve network security. What primary function does 802.1X provide?
Encrypts all user data sent over the network
Authenticates devices before allowing network access
Assigns VLANs dynamically based on IP address
Scans all incoming traffic for malware signatures
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're configuring security rules to block access to streaming and social media websites on company computers. Which of the following features should you use?
MAC address filtering
Port security
URL filtering
ARP filtering
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure that only compliant and authenticated devices are allowed onto the internal network. Which solution best meets this goal?
Port mirroring
Network Access Control (NAC)
Virtual LAN segmentation
Access Control Lists (ACLs)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a primary concern when managing encryption keys in a secure network?
Key length must match the password complexity policy
Keys should be rotated periodically and stored securely
Keys must be stored in the same location as the encrypted data
Keys should be shared via email with trusted users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization stores sensitive financial records. Which regulation is most likely to apply?
HIPAA
PCI DSS
FERPA
GDPR
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker exploits an unknown vulnerability in a system before the vendor can issue a patch. What is this called?
Logic Bomb
Legacy Attack
Zero-Day Exploit
Drive-by Download
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
HyQuizz_Mùa 3_Day 1
Quiz
•
Professional Development
10 questions
How Cyber Safe Are You? Part 4
Quiz
•
Professional Development
10 questions
Knowledge Check - 2
Quiz
•
Professional Development
15 questions
FOS Quiz 1
Quiz
•
Professional Development
10 questions
Quiz - Webinar #24
Quiz
•
Professional Development
10 questions
WORKSHOP: HEALTHCARE DATA LAKEHOUSE IN ACTION
Quiz
•
Professional Development
20 questions
Computer Hardware Quiz
Quiz
•
Professional Development
20 questions
svsvs
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development
