Search Header Logo

Module 16-17 part 2

Authored by Nishchal Bhujel

Computers

University

Used 1+ times

Module 16-17 part 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)

Fast Ethernet interfaces

console ports

serial interfaces

vty ports

loopback interfaces

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered the most effective way to mitigate a worm attack?

Download security updates from the operating system vendor and patch all vulnerable systems.

Change system passwords every 30 days.

Configure the correct IP domain name.

Generate the asymmetric RSA keys.

Set the user privilege levels.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the ping and tracert commands?

Tracert shows each hop, while ping shows a destination reply only.

Tracert uses IP addresses; ping does not.

Both ping and tracert can show results in a graphical display.

Ping shows whether the transmission is successful; tracert does not.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?

FTP

HTTP

SSH

Telnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator decides to use "WhatAreyouwaiting4" as the password on a newly installed router. Which statement applies to the password choice?

It is strong because it uses a passphrase.

It is weak because it is often the default password on new devices.

It is weak since it uses easily found personal information.

It is weak since it is a word that is easily found in the dictionary.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator decides to use "pR3s!d7n&0" as the password on a newly installed router. Which statement applies to the password choice?

It is strong because it uses a minimum of 10 numbers, letters and special characters.

It is weak because it is often the default password on new devices.

It is weak since it uses easily found personal information.

It is weak since it is a word that is easily found in the dictionary.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An administrator decides to use "5$7*4#033!" as the password on a newly installed router. Which statement applies to the password choice?

It is strong because it contains 10 numbers and special characters.

It is weak because it is often the default password on new devices.

It is weak since it uses easily found personal information.

It is strong because it uses a minimum of 10 numbers, letters and special characters.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?