Search Header Logo

Lesson 5

Authored by Benjamin Fenton

Other

University

Used 2+ times

Lesson 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement best describes the purpose of a security zone in network design?

Provides redundancy for power circuits

Isolates traffic only at layer 1 of the OSI model

Groups assets with similar trust and access requirements

Assigns public IPv6 addresses to internal hosts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A single Ethernet switch is divided so that ports 1–12 are VLAN 20 and ports 13–24 are VLAN 30. What is the primary security benefit of this configuration?

Extends cable length beyond 100 meters

Creates two separate broadcast domains that must be routed to communicate

Allows hosts to share the same MAC address

Encrypts traffic between hosts automatically

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a three-tier enterprise LAN, access switches are most likely to connect directly to which devices?

Core routers in the datacenter

Endpoint workstations and VoIP phones

ISP edge routers on the perimeter

Public web servers in a DMZ

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term “fail-closed” for a firewall means that if the firewall software crashes, ______.

all interfaces automatically downgrade to 10 Mbps

traffic is blocked until service is restored

sessions are rerouted to the Internet edge

cached web pages continue to load

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access-layer control prevents an attacker from unplugging a printer and gaining network access with a laptop on that port?

Dynamic DNS update

MAC limiting on the switch interface

Round-robin load balancing

Source IP affinity rules

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IEEE 802.1X uses Extensible Authentication Protocol (EAP) primarily to _______.

compress large multimedia streams

transport user credentials between supplicant and authentication server

assign IPv6 addresses to wireless clients

monitor SYN flood attempts on TCP 80

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A transparent firewall deployed “bump-in-the-wire” has which notable attribute?

Requires no change to existing IP addressing scheme

Must terminate VPN tunnels with IKEv2

Performs NAT from IPv4 to IPv6 automatically

Allows only inbound traffic to traverse VLAN trunks

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?