Network Security and Protocols Quiz

Network Security and Protocols Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

5 DAYS TRAINING UNDER CYBER SHAKTI P[ROJECT FOR WOMEN OFFICAILS

5 DAYS TRAINING UNDER CYBER SHAKTI P[ROJECT FOR WOMEN OFFICAILS

Professional Development

20 Qs

Topic 1 Question 500 to 520

Topic 1 Question 500 to 520

Professional Development

20 Qs

CDAC - DOS and Trojan Quiz

CDAC - DOS and Trojan Quiz

Professional Development

15 Qs

Konfigurasi Perangkat Jaringan

Konfigurasi Perangkat Jaringan

Professional Development

20 Qs

Ethical Hacking Kali Linux Part 4

Ethical Hacking Kali Linux Part 4

Professional Development

10 Qs

Desafios em Cibersegurança

Desafios em Cibersegurança

Professional Development

10 Qs

LINKS Cyber Youth Challenge - Round 4

LINKS Cyber Youth Challenge - Round 4

Professional Development

10 Qs

Understanding Computers and Networking

Understanding Computers and Networking

Professional Development

20 Qs

Network Security and Protocols Quiz

Network Security and Protocols Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Adrian Henderson

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a network administrator and tasked with securing all switches in the company network. What is the most effective step to prevent unauthorized access through unused switch ports?

Enable all switch ports for redundancy

Disable unused ports and place them in a shutdown state

Set up port forwarding on all open ports

Enable dynamic port allocation on unused ports

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization is implementing 802.1X to improve network security. What primary function does 802.1X provide?

Encrypts all user data sent over the network

Authenticates devices before allowing network access

Assigns VLANs dynamically based on IP address

Scans all incoming traffic for malware signatures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're configuring security rules to block access to streaming and social media websites on company computers. Which of the following features should you use?

MAC address filtering

Port security

URL filtering

ARP filtering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to ensure that only compliant and authenticated devices are allowed onto the internal network. Which solution best meets this goal?

Port mirroring

Network Access Control (NAC)

Virtual LAN segmentation

Access Control Lists (ACLs)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary concern when managing encryption keys in a secure network?

Key length must match the password complexity policy

Keys should be rotated periodically and stored securely

Keys must be stored in the same location as the encrypted data

Keys should be shared via email with trusted users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization stores sensitive financial records. Which regulation is most likely to apply?

HIPAA

PCI DSS

FERPA

GDPR

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker exploits an unknown vulnerability in a system before the vendor can issue a patch. What is this called?

Logic Bomb

Legacy Attack

Zero-Day Exploit

Drive-by Download

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?