Module 4

Module 4

1st - 5th Grade

13 Qs

quiz-placeholder

Similar activities

Challenge yourself

Challenge yourself

2nd Grade

13 Qs

UTS AIJ

UTS AIJ

3rd Grade

10 Qs

ICT P5 Final Revision1 1st Term 2024

ICT P5 Final Revision1 1st Term 2024

5th Grade

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Pretest Cisco Day-01

Pretest Cisco Day-01

3rd Grade

15 Qs

Grade 5 Unit 1

Grade 5 Unit 1

5th Grade

14 Qs

Lesson3-Theme1-NETWORKS

Lesson3-Theme1-NETWORKS

5th Grade

15 Qs

The Internet and Browsers

The Internet and Browsers

1st Grade

10 Qs

Module 4

Module 4

Assessment

Quiz

Computers

1st - 5th Grade

Easy

Created by

who areyou

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At what point in the enterprise network are packets arriving from the internet examined prior to entering the network?

Campus Core

Internet Edge

Network Edge

WAN Edge

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)

an IP domain name

a unique hostname

a user account

an enable mode password

an encrypted password

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one difference between using Telnet or SSH to connect to a network device for management purposes?

Telnet uses UDP as the transport protocol whereas SSH uses TCP.

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Telnet supports a host GUI whereas SSH only supports a host CLI.

Telnet does not provide authentication whereas SSH provides authentication

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three.)

operating system security

router hardening

physical security

flash security

remote access security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a good password recommendation for a Cisco router?

Use the service password-encryption command to protect a password used to log into a remote device across the network.

Use a minimum of 7 characters.

Zeroize all passwords used.

Use one or more spaces within a multiword phrase.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using a banner message on a Cisco network device?

It can provide more security by slowing down attacks.

It can be used to create a quiet period where remote connections are refused.

It is effective in deflecting threat actors from entering the device.

It can protect the organization from a legal perspective

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?

out-of-band access to a switch through the use of a virtual terminal with password authentication

remote access to the switch through the use of a telephone dialup connection

direct access to the switch through the use of a terminal emulation program

on-site access to a switch through the use of a directly connected PC and a console cable

remote access to a switch where data is encrypted during the session

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?