Network Security and Protocols Quiz
Quiz
•
Information Technology (IT)
•
Professional Development
•
Medium
Adrian Henderson
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a network administrator and tasked with securing all switches in the company network. What is the most effective step to prevent unauthorized access through unused switch ports?
Enable all switch ports for redundancy
Disable unused ports and place them in a shutdown state
Set up port forwarding on all open ports
Enable dynamic port allocation on unused ports
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization is implementing 802.1X to improve network security. What primary function does 802.1X provide?
Encrypts all user data sent over the network
Authenticates devices before allowing network access
Assigns VLANs dynamically based on IP address
Scans all incoming traffic for malware signatures
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You're configuring security rules to block access to streaming and social media websites on company computers. Which of the following features should you use?
MAC address filtering
Port security
URL filtering
ARP filtering
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to ensure that only compliant and authenticated devices are allowed onto the internal network. Which solution best meets this goal?
Port mirroring
Network Access Control (NAC)
Virtual LAN segmentation
Access Control Lists (ACLs)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a primary concern when managing encryption keys in a secure network?
Key length must match the password complexity policy
Keys should be rotated periodically and stored securely
Keys must be stored in the same location as the encrypted data
Keys should be shared via email with trusted users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization stores sensitive financial records. Which regulation is most likely to apply?
HIPAA
PCI DSS
FERPA
GDPR
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker exploits an unknown vulnerability in a system before the vendor can issue a patch. What is this called?
Logic Bomb
Legacy Attack
Zero-Day Exploit
Drive-by Download
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
Exam Prep 2
Quiz
•
Professional Development
20 questions
Networking Devices and Protocols Quiz
Quiz
•
Professional Development
15 questions
Quiz sobre Fundamentos de Redes
Quiz
•
Professional Development
20 questions
Structured Cabling and Networking Quiz
Quiz
•
Professional Development
10 questions
test inițial
Quiz
•
Professional Development
10 questions
POST-TEST DAY 3
Quiz
•
Professional Development
11 questions
Cybersecurity fun quiz
Quiz
•
Professional Development
16 questions
Network Security Quiz
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade