
Module 16-17 part 2
Authored by Nishchal Bhujel
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
On which two interfaces or ports can security be improved by configuring executive timeouts? (Choose two.)
Fast Ethernet interfaces
console ports
serial interfaces
vty ports
loopback interfaces
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is considered the most effective way to mitigate a worm attack?
Download security updates from the operating system vendor and patch all vulnerable systems.
Change system passwords every 30 days.
Configure the correct IP domain name.
Generate the asymmetric RSA keys.
Set the user privilege levels.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes the ping and tracert commands?
Tracert shows each hop, while ping shows a destination reply only.
Tracert uses IP addresses; ping does not.
Both ping and tracert can show results in a graphical display.
Ping shows whether the transmission is successful; tracert does not.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices?
FTP
HTTP
SSH
Telnet
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator decides to use "WhatAreyouwaiting4" as the password on a newly installed router. Which statement applies to the password choice?
It is strong because it uses a passphrase.
It is weak because it is often the default password on new devices.
It is weak since it uses easily found personal information.
It is weak since it is a word that is easily found in the dictionary.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator decides to use "pR3s!d7n&0" as the password on a newly installed router. Which statement applies to the password choice?
It is strong because it uses a minimum of 10 numbers, letters and special characters.
It is weak because it is often the default password on new devices.
It is weak since it uses easily found personal information.
It is weak since it is a word that is easily found in the dictionary.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator decides to use "5$7*4#033!" as the password on a newly installed router. Which statement applies to the password choice?
It is strong because it contains 10 numbers and special characters.
It is weak because it is often the default password on new devices.
It is weak since it uses easily found personal information.
It is strong because it uses a minimum of 10 numbers, letters and special characters.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?