Part 3.2

Part 3.2

Professional Development

20 Qs

quiz-placeholder

Similar activities

Part 4.1

Part 4.1

Professional Development

20 Qs

Sec+ - 9A - Network Security Baselines

Sec+ - 9A - Network Security Baselines

Professional Development

21 Qs

Part 1.4

Part 1.4

Professional Development

20 Qs

Chapter 5: Network Security and Monitoring

Chapter 5: Network Security and Monitoring

University - Professional Development

15 Qs

Sec+ CH.3  Review Test

Sec+ CH.3 Review Test

Professional Development

15 Qs

Part 3.4

Part 3.4

Professional Development

20 Qs

CEH Study Guide - 02 Networking Foundations

CEH Study Guide - 02 Networking Foundations

Professional Development

15 Qs

CCNA Security Pre-Assessment

CCNA Security Pre-Assessment

Professional Development

15 Qs

Part 3.2

Part 3.2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Kirk Marshall

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Given a network environment, how would you use SNMP traps to detect unauthorized device access?

By configuring SNMP traps to alert when unknown devices attempt to connect

By disabling SNMP traps on all devices

By only monitoring physical port status

By using SNMP traps to block all network traffic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a Management Information Base (MIB) assist in network monitoring?

By providing a structured database of network device information for SNMP queries

By encrypting all network traffic

By blocking unauthorized users from accessing the network

By physically connecting devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When comparing SNMP v2c and v3, how would you apply the correct version for a network requiring strong authentication?

Use SNMP v3 for its enhanced authentication features

Use SNMP v2c for its lack of authentication

Use SNMP v1 for its simplicity

Use SNMP v2c for its encryption capabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you utilize community strings in SNMP to improve network security?

By setting unique, complex community strings for read and write access

By using the default community string "public" for all devices

By disabling community strings entirely

By sharing community strings with all users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can flow data be used to identify unusual network activity?

By analyzing flow records for unexpected spikes in traffic or new communication patterns

By only monitoring device uptime

By ignoring flow data and focusing on packet headers

By disabling flow data collection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an effective way to use packet capture to troubleshoot intermittent connectivity issues?

Capture packets during the time of the issue and analyze for anomalies or errors

Only capture packets when the network is idle

Ignore packet capture and rely on user reports

Capture packets from unrelated network segments

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you establish baseline metrics for network performance?

By collecting and averaging network performance data over a defined period under normal conditions

By only recording data during outages

By using random data points

By ignoring historical data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?