Network Security and Protocols Quiz

Quiz
•
Information Technology (IT)
•
Professional Development
•
Medium
Adrian Henderson
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a network administrator and tasked with securing all switches in the company network. What is the most effective step to prevent unauthorized access through unused switch ports?
Enable all switch ports for redundancy
Disable unused ports and place them in a shutdown state
Set up port forwarding on all open ports
Enable dynamic port allocation on unused ports
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization is implementing 802.1X to improve network security. What primary function does 802.1X provide?
Encrypts all user data sent over the network
Authenticates devices before allowing network access
Assigns VLANs dynamically based on IP address
Scans all incoming traffic for malware signatures
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're configuring security rules to block access to streaming and social media websites on company computers. Which of the following features should you use?
MAC address filtering
Port security
URL filtering
ARP filtering
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure that only compliant and authenticated devices are allowed onto the internal network. Which solution best meets this goal?
Port mirroring
Network Access Control (NAC)
Virtual LAN segmentation
Access Control Lists (ACLs)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a primary concern when managing encryption keys in a secure network?
Key length must match the password complexity policy
Keys should be rotated periodically and stored securely
Keys must be stored in the same location as the encrypted data
Keys should be shared via email with trusted users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization stores sensitive financial records. Which regulation is most likely to apply?
HIPAA
PCI DSS
FERPA
GDPR
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker exploits an unknown vulnerability in a system before the vendor can issue a patch. What is this called?
Logic Bomb
Legacy Attack
Zero-Day Exploit
Drive-by Download
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
Lesson01 Quiz

Quiz
•
Professional Development
19 questions
SENAI 2024 | REDES 1

Quiz
•
Professional Development
15 questions
Microsoft IT Pro Meetup - July

Quiz
•
Professional Development
20 questions
NMC-IT PD 2024

Quiz
•
Professional Development
20 questions
Prelim: Networking II

Quiz
•
Professional Development
15 questions
Pre-test Quiz

Quiz
•
Professional Development
15 questions
Understanding BOM in JavaScript (11R)

Quiz
•
Professional Development
20 questions
Microsoft Intune - Pre-Assessment

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade