You are a network administrator and tasked with securing all switches in the company network. What is the most effective step to prevent unauthorized access through unused switch ports?
Network Security and Protocols Quiz

Quiz
•
Information Technology (IT)
•
Professional Development
•
Medium
Adrian Henderson
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Enable all switch ports for redundancy
Disable unused ports and place them in a shutdown state
Set up port forwarding on all open ports
Enable dynamic port allocation on unused ports
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization is implementing 802.1X to improve network security. What primary function does 802.1X provide?
Encrypts all user data sent over the network
Authenticates devices before allowing network access
Assigns VLANs dynamically based on IP address
Scans all incoming traffic for malware signatures
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're configuring security rules to block access to streaming and social media websites on company computers. Which of the following features should you use?
MAC address filtering
Port security
URL filtering
ARP filtering
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure that only compliant and authenticated devices are allowed onto the internal network. Which solution best meets this goal?
Port mirroring
Network Access Control (NAC)
Virtual LAN segmentation
Access Control Lists (ACLs)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a primary concern when managing encryption keys in a secure network?
Key length must match the password complexity policy
Keys should be rotated periodically and stored securely
Keys must be stored in the same location as the encrypted data
Keys should be shared via email with trusted users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization stores sensitive financial records. Which regulation is most likely to apply?
HIPAA
PCI DSS
FERPA
GDPR
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker exploits an unknown vulnerability in a system before the vendor can issue a patch. What is this called?
Logic Bomb
Legacy Attack
Zero-Day Exploit
Drive-by Download
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Topic 1 Question 521 to 540

Quiz
•
Professional Development
15 questions
IT Test

Quiz
•
Professional Development
20 questions
Chapter 5: Reconnaissance and Intelligence Gathering

Quiz
•
Professional Development
16 questions
Network Security Quiz

Quiz
•
Professional Development
20 questions
Cybersecurity and IT Infrastructure Quiz

Quiz
•
Professional Development
10 questions
Networking Tech Talk Quiz

Quiz
•
Professional Development
20 questions
CCSE-2

Quiz
•
Professional Development
20 questions
Chapter 3: Malicious Activity

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade