
Network Security and Protocols Quiz
Authored by Adrian Henderson
Information Technology (IT)
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a network administrator and tasked with securing all switches in the company network. What is the most effective step to prevent unauthorized access through unused switch ports?
Enable all switch ports for redundancy
Disable unused ports and place them in a shutdown state
Set up port forwarding on all open ports
Enable dynamic port allocation on unused ports
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization is implementing 802.1X to improve network security. What primary function does 802.1X provide?
Encrypts all user data sent over the network
Authenticates devices before allowing network access
Assigns VLANs dynamically based on IP address
Scans all incoming traffic for malware signatures
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're configuring security rules to block access to streaming and social media websites on company computers. Which of the following features should you use?
MAC address filtering
Port security
URL filtering
ARP filtering
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure that only compliant and authenticated devices are allowed onto the internal network. Which solution best meets this goal?
Port mirroring
Network Access Control (NAC)
Virtual LAN segmentation
Access Control Lists (ACLs)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a primary concern when managing encryption keys in a secure network?
Key length must match the password complexity policy
Keys should be rotated periodically and stored securely
Keys must be stored in the same location as the encrypted data
Keys should be shared via email with trusted users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization stores sensitive financial records. Which regulation is most likely to apply?
HIPAA
PCI DSS
FERPA
GDPR
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker exploits an unknown vulnerability in a system before the vendor can issue a patch. What is this called?
Logic Bomb
Legacy Attack
Zero-Day Exploit
Drive-by Download
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?