Part 4.3

Part 4.3

Professional Development

20 Qs

quiz-placeholder

Similar activities

 Network Security Fundamentals

Network Security Fundamentals

Professional Development

20 Qs

CCNA - SRWE&ENSA - Cap9-12

CCNA - SRWE&ENSA - Cap9-12

Professional Development

15 Qs

A+ - 17C - Troubleshoot Workstation Security Issues

A+ - 17C - Troubleshoot Workstation Security Issues

Professional Development

20 Qs

A+ - 10B - Configure Windows System Settings

A+ - 10B - Configure Windows System Settings

Professional Development

17 Qs

Part 3.2

Part 3.2

Professional Development

20 Qs

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Professional Development

20 Qs

Cybersecurity Quiz for DCB Parents

Cybersecurity Quiz for DCB Parents

Professional Development

20 Qs

Part 4.2

Part 4.2

Professional Development

20 Qs

Part 4.3

Part 4.3

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Kirk Marshall

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following actions best demonstrates device hardening on a network switch?

Installing additional RAM modules

Disabling unused ports and services

Increasing the screen brightness

Changing the device’s color

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is setting up a new router. Which step should they take to improve security during initial configuration?

Leave the default password unchanged

Change the default password to a strong, unique one

Share the default password with all users

Disable all network interfaces

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does enabling port security on a switch help protect the network?

It increases the speed of data transmission

It restricts access to the network based on device MAC addresses

It allows unlimited devices to connect to each port

It disables all ports by default

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When implementing 802.1X authentication, what is the primary benefit for network security?

It allows any device to connect without credentials

It authenticates devices before granting network access

It increases wireless signal strength

It disables encryption on the network

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a MAC filtering strategy?

Allowing only devices with specific MAC addresses to connect

Assigning static IP addresses to all devices

Using only wireless connections

Disabling DHCP on the network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to prevent unauthorized devices from connecting to its network. Which network access control method should they implement?

Port security

Open Wi-Fi access

Disabling all firewalls

Using default device settings

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using an Access Control List (ACL) on a router?

To filter network traffic based on defined rules

To increase the router’s processing speed

To automatically update firmware

To provide wireless connectivity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?