Search Header Logo

Part 3.2

Authored by Kirk Marshall

Computers

Professional Development

Part 3.2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Given a network environment, how would you use SNMP traps to detect unauthorized device access?

By configuring SNMP traps to alert when unknown devices attempt to connect

By disabling SNMP traps on all devices

By only monitoring physical port status

By using SNMP traps to block all network traffic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a Management Information Base (MIB) assist in network monitoring?

By providing a structured database of network device information for SNMP queries

By encrypting all network traffic

By blocking unauthorized users from accessing the network

By physically connecting devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When comparing SNMP v2c and v3, how would you apply the correct version for a network requiring strong authentication?

Use SNMP v3 for its enhanced authentication features

Use SNMP v2c for its lack of authentication

Use SNMP v1 for its simplicity

Use SNMP v2c for its encryption capabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you utilize community strings in SNMP to improve network security?

By setting unique, complex community strings for read and write access

By using the default community string "public" for all devices

By disabling community strings entirely

By sharing community strings with all users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can flow data be used to identify unusual network activity?

By analyzing flow records for unexpected spikes in traffic or new communication patterns

By only monitoring device uptime

By ignoring flow data and focusing on packet headers

By disabling flow data collection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an effective way to use packet capture to troubleshoot intermittent connectivity issues?

Capture packets during the time of the issue and analyze for anomalies or errors

Only capture packets when the network is idle

Ignore packet capture and rely on user reports

Capture packets from unrelated network segments

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How would you establish baseline metrics for network performance?

By collecting and averaging network performance data over a defined period under normal conditions

By only recording data during outages

By using random data points

By ignoring historical data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?