Building and Securing a Small Network

Building and Securing a Small Network

University

72 Qs

quiz-placeholder

Similar activities

DIT Unit 4 Study Guide

DIT Unit 4 Study Guide

6th Grade - University

76 Qs

ITF+ pt3

ITF+ pt3

9th Grade - Professional Development

67 Qs

CompTIA A+ 220-1101 Practice Exam

CompTIA A+ 220-1101 Practice Exam

9th Grade - Professional Development

75 Qs

CCNA 1 (v.6) Final Exam Study Guide

CCNA 1 (v.6) Final Exam Study Guide

University

70 Qs

Communicating Between Networks

Communicating Between Networks

University

68 Qs

Quiz 2 - JK3 - 2TK

Quiz 2 - JK3 - 2TK

University

70 Qs

CompTIA 1102

CompTIA 1102

University

68 Qs

CompTIA A+ 1102

CompTIA A+ 1102

9th Grade - Professional Development

77 Qs

Building and Securing a Small Network

Building and Securing a Small Network

Assessment

Quiz

Computers

University

Easy

Created by

Sewer Montano

Used 2+ times

FREE Resource

72 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component is designed to protect against unauthorized communications to and from a computer?

  • security center

  • antimalware

  • antivirus

  • firewall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?

  • RouterA(config)# login block-for 10 attempts 2 within 30

RouterA(config)# login block-for 30 attempts 2 within 10

RouterA(config)# login block-for 30 attempts 10 within 2

Answer explanation

COMMAND FORMAT:

login block-for <block-time> attempts <attempt-limit> within <time-period>

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the network security accounting function?

to require users to prove who they are

to determine which resources a user can access

to keep track of the actions of a user

to provide challenge and response questions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack may involve the use of tools such as nslookup and fping?

access attack

worm attack

reconnaissance attack

denial of service attack

Answer explanation

A Reconnaissance Attack is like the “scouting phase” of hacking. The attacker tries to gather as much information as possible about the target network before launching an actual attack.

  • nslookup → Used to query DNS and find out IP addresses or domain names.

  • fping → A faster version of ping used to scan networks for active devices.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match each weakness with an example:

security policy weakness

The network administrator did not fully consider the implications of unauthorized users accessing the network.

When implementing an access list on a router, a network engineer did not filter a type of malicous traffic.

A network engineer is examining the operating system of a network device for vulnerabilities.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match each weakness with an example:

configuration weakness

The network administrator did not fully consider the implications of unauthorized users accessing the network.

When implementing an access list on a router, a network engineer did not filter a type of malicous traffic.

A network engineer is examining the operating system of a network device for vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match each weakness with an example:

technological weakness

The network administrator did not fully consider the implications of unauthorized users accessing the network.

When implementing an access list on a router, a network engineer did not filter a type of malicous traffic.

A network engineer is examining the operating system of a network device for vulnerabilities.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?