Network Device Vulnerabilities

Network Device Vulnerabilities

University

10 Qs

quiz-placeholder

Similar activities

The Linux Vault

The Linux Vault

University

15 Qs

Introduction to Computer Science, Group 1,

Introduction to Computer Science, Group 1,

University

10 Qs

ITEC 70 - Quiz # 2

ITEC 70 - Quiz # 2

University

15 Qs

 Chapter 5 Database Management Quiz

Chapter 5 Database Management Quiz

University

10 Qs

Minigame CLB Tin học 20/10

Minigame CLB Tin học 20/10

University

15 Qs

JARINGAN KOMPUTER DAN INTERNET

JARINGAN KOMPUTER DAN INTERNET

10th Grade - University

9 Qs

G4-Microprocessors and Their Uses

G4-Microprocessors and Their Uses

4th Grade - University

15 Qs

Chapter Quiz

Chapter Quiz

University

10 Qs

Network Device Vulnerabilities

Network Device Vulnerabilities

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Christian Peña

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols should be disabled on a critical network device such as a router?

TCP/IP

ICMP

IPX/SPX

RIP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What feature of a network device, such as a router or switch, can control access permissions for network data?

DNS protocol

Firmware update

Firewall

Access control lists

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which zone of a network security topology should contain your Internet servers, such as web, FTP, and e-mail servers?

DMZ

VLAN

VPN

Intranet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network service allows internal addresses to be hidden from outside networks and allows several internal hosts to use the same external address?

NAT

VPN

VLAN

IP spoofing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What networking technology would be used to divide an internal network into smaller, more manageable, logical segments?

NAT

Tunneling

VPN

VLAN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been tasked to cable the network backbone of a new section of a manufacturing plant. Which of the following is the most secure type of cable to use for this environment?

10BaseT

Cat3

Cat5

Fiber-optic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a DoS attack, a network administrator blocks the source IP with the firewall, but the attack continues. What is the most likely cause of the problem?

The DoS worm has already infected locally.

The attack is coming from multiple, distributed hosts.

A firewall can’t block DoS attacks.

Anti-virus software needs to be installed on the target server.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?