Network Device Vulnerabilities

Network Device Vulnerabilities

University

10 Qs

quiz-placeholder

Similar activities

BASIC PC COMPONENTS AND TROUBLESHOOTING  - BATCH 1

BASIC PC COMPONENTS AND TROUBLESHOOTING - BATCH 1

University

15 Qs

Fundamentals

Fundamentals

7th Grade - University

12 Qs

CLC Lesson 7 Quiz

CLC Lesson 7 Quiz

University

12 Qs

Data Management and Storage

Data Management and Storage

University

10 Qs

Google sheets

Google sheets

7th Grade - University

14 Qs

Q4. Entity Relationship Modelling

Q4. Entity Relationship Modelling

University

15 Qs

Biomimicry

Biomimicry

University

12 Qs

Network Device Vulnerabilities

Network Device Vulnerabilities

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Christian Peña

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols should be disabled on a critical network device such as a router?

TCP/IP

ICMP

IPX/SPX

RIP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What feature of a network device, such as a router or switch, can control access permissions for network data?

DNS protocol

Firmware update

Firewall

Access control lists

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which zone of a network security topology should contain your Internet servers, such as web, FTP, and e-mail servers?

DMZ

VLAN

VPN

Intranet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network service allows internal addresses to be hidden from outside networks and allows several internal hosts to use the same external address?

NAT

VPN

VLAN

IP spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What networking technology would be used to divide an internal network into smaller, more manageable, logical segments?

NAT

Tunneling

VPN

VLAN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been tasked to cable the network backbone of a new section of a manufacturing plant. Which of the following is the most secure type of cable to use for this environment?

10BaseT

Cat3

Cat5

Fiber-optic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a DoS attack, a network administrator blocks the source IP with the firewall, but the attack continues. What is the most likely cause of the problem?

The DoS worm has already infected locally.

The attack is coming from multiple, distributed hosts.

A firewall can’t block DoS attacks.

Anti-virus software needs to be installed on the target server.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?