Day 10 Quiz - Physical & Network Security
Quiz
•
Professional Development
•
Professional Development
•
Practice Problem
•
Medium
Robert Teney
Used 3+ times
FREE Resource
Enhance your content in a minute
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What network hardening technique helps prevent unauthorized access to unused switch ports?
Router Advertisement (RA) Guard
Port security
Dynamic ARP inspection
Control plane policing
Answer explanation
Port Security is used to control access to switch ports by specifying which devices are allowed to connect to each port. Port security features, such as limiting the number of MAC addresses that can be learned on a port or binding specific MAC addresses to a port, help prevent unauthorized devices from accessing the network through unused or inactive ports.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
Which network hardening technique protects against unauthorized access to SNMP data?
Secure SNMP
Private VLANs
Disable unneeded network services
Dynamic ARP inspection
Answer explanation
Secure Simple Network Management Protocol (SNMP) involves using SNMPv3, which provides enhanced security features such as authentication and encryption. This ensures that SNMP data is protected from unauthorized access and eavesdropping by requiring proper credentials and encrypting the data transmitted over the network.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What method should be employed to prevent rogue devices from advertising themselves as routers?
Router Advertisement (RA) Guard
Control plane policing
Disable unneeded switchports
Private VLANs
Answer explanation
Router Advertisement (RA) Guard is used to prevent unauthorized or rogue devices from sending Router Advertisement messages in an IPv6 network. By filtering out or blocking these rogue RA messages, RA Guard helps to protect the network from being disrupted by devices pretending to be legitimate routers.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
Which technique involves restricting the use of unnecessary network protocols and services to reduce the attack surface?
Dynamic ARP inspection
Disable unneeded network services
Port security
Private VLANs
Answer explanation
This technique involves turning off or disabling network services and protocols that are not required for the network's operation. By reducing the number of active services, you minimize potential vulnerabilities and reduce the attack surface that could be exploited by attackers.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What network hardening technique involves modifying passwords to ensure they are not easily guessed or cracked?
Change default VLAN
Password complexity/length
Enable DHCP snooping
Patch and firmware management
Answer explanation
Password complexity/length refers to the practice of setting strong passwords that include a combination of uppercase and lowercase letters, numbers, and special characters, as well as ensuring passwords meet a minimum length requirement. This technique enhances security by making it harder for attackers to guess or crack passwords.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
Which network hardening method helps prevent unauthorized access to network resources based on predefined rules?
Access control list
Role-based access
Change default passwords
Firewall rules
Answer explanation
Access control lists (ACLs) are used to control traffic flow in a network by allowing or denying access to network resources based on predefined rules. By configuring ACLs, administrators can restrict access to specific IP addresses, ports, or protocols, thereby enhancing network security.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Objective 4.3/Day 10 -
What network hardening technique involves regularly updating software and firmware to address known vulnerabilities and security issues?
Patch and firmware management
Enable DHCP snooping
Change default VLAN
Role-based access
Answer explanation
Patch and firmware management is the process of regularly updating software and firmware on network devices to address known vulnerabilities and security issues. By keeping devices up-to-date with the latest patches and firmware releases, organizations can mitigate the risk of exploitation by cyber threats.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
30 questions
INDIHOME 3P JULI 2018
Quiz
•
University - Professi...
23 questions
Stormwater & Sub-soil drainage
Quiz
•
Professional Development
23 questions
Lesson-5 Support Project Team Performance
Quiz
•
Professional Development
24 questions
Product PCS Sales Conference
Quiz
•
Professional Development
24 questions
Zain Ul Abiddin
Quiz
•
Professional Development
22 questions
Microsoft 98-365 Server Admin Part 2
Quiz
•
KG - Professional Dev...
25 questions
Management of Financial Services - 1
Quiz
•
University - Professi...
24 questions
PRAXIS II 5203 Reading (24 ques.)
Quiz
•
University - Professi...
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
