Networking 3/4 Chapter 13 Test Review

Networking 3/4 Chapter 13 Test Review

9th - 12th Grade

28 Qs

quiz-placeholder

Similar activities

Ch5 Review, MSCA Ex 70-411 Guide

Ch5 Review, MSCA Ex 70-411 Guide

12th Grade

25 Qs

Computer System

Computer System

12th Grade - University

25 Qs

Mircrosoft Server Admin 98-365

Mircrosoft Server Admin 98-365

KG - Professional Development

24 Qs

Digital Literacy Chapter 4 Review

Digital Literacy Chapter 4 Review

9th - 12th Grade

25 Qs

Test #3 Version 1

Test #3 Version 1

8th - 10th Grade

25 Qs

Keyboard Shortcuts

Keyboard Shortcuts

9th - 12th Grade

25 Qs

Kuis Microsoft Word

Kuis Microsoft Word

10th Grade

25 Qs

Software - Quiz # 2 for 9/11

Software - Quiz # 2 for 9/11

11th Grade - University

25 Qs

Networking 3/4 Chapter 13 Test Review

Networking 3/4 Chapter 13 Test Review

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Bradford Scott

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you MOST likely to recommend to the client?

PPP

MS-CHAP

CHAP

EAP

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You are configuring the Local Security Policy on a Windows system. You want to require users to create passwords that are at least 10 characters in length. You also want to prevent login after three unsuccessful login attempts. Which policies should you configure? (Select two.)

Enforce password history

Account lockout threshold

Minimum password length

Password must meet complexity requirements

Maximum password age

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have hired 10 new temporary employees to be with the company for three months. How can you make sure that these users can only log on during regular business hours?

Configure account lockout in Group Policy.

Configure day/time restrictions in user accounts.

Configure account policies in Group Policy.

Configure account expiration in user accounts.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network switch is configured to perform the following validation checks on its ports:

-All ARP requests and responses are intercepted.

-Each intercepted request is verified to ensure that it has a valid IP-to-MAC address binding.

-If the packet has a valid binding, the switch forwards the packet to the appropriate destination.'- If the packet has an invalid binding, the switch drops the ARP packet.

Which security feature was enabled on the switch to accomplish this task?

Dynamic ARP inspection

IGMP snooping

DHCP snooping

Port security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WindowsUpdate.log?

A log file that deploys updates to device groups over a deployment timeline.

A log or record of all notable changes made to a Windows system.

A log file that analyzes Windows Update Service, BITS, and Windows Network Diagnostics Service.

A log file that allows you to see enforced policies on your Windows 10 machine.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following actions typically involve the use of 802.1x authentication? (Select two.)

Authenticating remote access clients.

Controlling access through a router.

Controlling access through a wireless access point.

Controlling access through a switch.

Authenticating VPN users through the internet.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are in the process of implementing a Network Access Protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. The remediation network needs to be isolated from the secure network. Which technology should you implement to accomplish this task?

Port security

Virtual private network (VPN)

Data encryption using PKI

Network segmentation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?