58.1. Match the type of threat with the cause. Hardware threats

Basic Networking v2

Quiz
•
Computers
•
University
•
Medium

Safiha Risna
Used 4+ times
FREE Resource
58 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.2. Match the type of threat with the cause. Environmental threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.3. Match the type of threat with the cause. Electrical threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
58.4. Match the type of threat with the cause. Maintenance threats
poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling and poor labeling.
temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
physical damage to servers, routers, switches, cabling plant, and workstations.
voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
62.What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.)
Switches become overloaded because they concentrate all the traffic from the attached subnets.
The ARP request is sent as a broadcast, and will flood the entire subnet.
The network may become overloaded because ARP reply messages have a very large payload due to the 48-bit MAC address and 32-bit IP address that they contain.
A large number of ARP request and reply messages may slow down the switching process, leading the switch to make many changes in its MAC table.
All ARP request messages must be processed by all nodes on the local network.
Answer explanation
Explanation: ARP requests are sent as broadcasts:
(1) All nodes will receive them, and they will be processed by software, interrupting the CPU.
(2) The switch forwards (floods) Layer 2 broadcasts to all ports.
A switch does not change its MAC table based on ARP request or reply messages. The switch populates the MAC table using the source MAC address of all frames. The ARP payload is very small and does not overload the switch.
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
63.A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)
ping
ipconfig
nslookup
netsh interface ipv6 show neighbor
arp -a
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
67.What are the two most effective ways to defend against malware? (Choose two.)
Update the operating system and other application software.
Implement network firewalls.
Install and update antivirus software.
Implement a VPN.
Implement RAID.
Answer explanation
Explanation: A cybersecurity specialist must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities.
Create a free account and access millions of resources
Similar Resources on Quizizz
55 questions
NET1L - Lesson 3 (Protocol Suites Pt. 2)

Quiz
•
University
53 questions
Konsentrasi Keahlian TKJ

Quiz
•
12th Grade - University
60 questions
quiz1 it exam

Quiz
•
University
55 questions
Networking 1 Module 1 - 4

Quiz
•
University
58 questions
NET1L - Lesson 3 (Reference Models - Data Encapsulation)

Quiz
•
University
58 questions
NET1L - Lesson 1 (Network Components)

Quiz
•
University
60 questions
Baldwin University College. Osu Accra. Level 300

Quiz
•
University
56 questions
ICT_Full_Base_2

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade