Network Security and Protocols Quiz

Network Security and Protocols Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

CyberSecurity Training-Quiz

CyberSecurity Training-Quiz

Professional Development

19 Qs

Chapter 3: Malicious Activity

Chapter 3: Malicious Activity

Professional Development

20 Qs

Inter-VLAN: Pre-activity

Inter-VLAN: Pre-activity

Professional Development

15 Qs

IT Test

IT Test

Professional Development

15 Qs

Chapter 5: Reconnaissance and Intelligence Gathering

Chapter 5: Reconnaissance and Intelligence Gathering

Professional Development

20 Qs

Cybersecurity and IT Infrastructure Quiz

Cybersecurity and IT Infrastructure Quiz

Professional Development

20 Qs

Kamis Kuis

Kamis Kuis

Professional Development

10 Qs

Networking Quiz

Networking Quiz

Professional Development

20 Qs

Network Security and Protocols Quiz

Network Security and Protocols Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Adrian Henderson

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a network administrator and tasked with securing all switches in the company network. What is the most effective step to prevent unauthorized access through unused switch ports?

Enable all switch ports for redundancy

Disable unused ports and place them in a shutdown state

Set up port forwarding on all open ports

Enable dynamic port allocation on unused ports

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization is implementing 802.1X to improve network security. What primary function does 802.1X provide?

Encrypts all user data sent over the network

Authenticates devices before allowing network access

Assigns VLANs dynamically based on IP address

Scans all incoming traffic for malware signatures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're configuring security rules to block access to streaming and social media websites on company computers. Which of the following features should you use?

MAC address filtering

Port security

URL filtering

ARP filtering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure that only compliant and authenticated devices are allowed onto the internal network. Which solution best meets this goal?

Port mirroring

Network Access Control (NAC)

Virtual LAN segmentation

Access Control Lists (ACLs)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary concern when managing encryption keys in a secure network?

Key length must match the password complexity policy

Keys should be rotated periodically and stored securely

Keys must be stored in the same location as the encrypted data

Keys should be shared via email with trusted users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization stores sensitive financial records. Which regulation is most likely to apply?

HIPAA

PCI DSS

FERPA

GDPR

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker exploits an unknown vulnerability in a system before the vendor can issue a patch. What is this called?

Logic Bomb

Legacy Attack

Zero-Day Exploit

Drive-by Download

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?