Lesson 5

Lesson 5

University

30 Qs

quiz-placeholder

Similar activities

BASIC CONFIG,SWITH & BRIDGE MIKROTIK

BASIC CONFIG,SWITH & BRIDGE MIKROTIK

University

30 Qs

FUNCTIONS OF LAYERS & DATA LINK LAYER

FUNCTIONS OF LAYERS & DATA LINK LAYER

University

25 Qs

Spanning Tree Protocol Quiz

Spanning Tree Protocol Quiz

University

25 Qs

(Part 1) Modules 10 – 13: L2 Security and WLANs

(Part 1) Modules 10 – 13: L2 Security and WLANs

University

28 Qs

Soal Produktif TKJ

Soal Produktif TKJ

University

30 Qs

TEST SET 1 OBJECTIVES

TEST SET 1 OBJECTIVES

University

30 Qs

EtherChannel and HSRP Quiz

EtherChannel and HSRP Quiz

University

35 Qs

TUGAS_TAMBAHAN

TUGAS_TAMBAHAN

University

30 Qs

Lesson 5

Lesson 5

Assessment

Quiz

Other

University

Medium

Created by

Benjamin Fenton

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement best describes the purpose of a security zone in network design?

Provides redundancy for power circuits

Isolates traffic only at layer 1 of the OSI model

Groups assets with similar trust and access requirements

Assigns public IPv6 addresses to internal hosts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A single Ethernet switch is divided so that ports 1–12 are VLAN 20 and ports 13–24 are VLAN 30. What is the primary security benefit of this configuration?

Extends cable length beyond 100 meters

Creates two separate broadcast domains that must be routed to communicate

Allows hosts to share the same MAC address

Encrypts traffic between hosts automatically

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a three-tier enterprise LAN, access switches are most likely to connect directly to which devices?

Core routers in the datacenter

Endpoint workstations and VoIP phones

ISP edge routers on the perimeter

Public web servers in a DMZ

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term “fail-closed” for a firewall means that if the firewall software crashes, ______.

all interfaces automatically downgrade to 10 Mbps

traffic is blocked until service is restored

sessions are rerouted to the Internet edge

cached web pages continue to load

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access-layer control prevents an attacker from unplugging a printer and gaining network access with a laptop on that port?

Dynamic DNS update

MAC limiting on the switch interface

Round-robin load balancing

Source IP affinity rules

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IEEE 802.1X uses Extensible Authentication Protocol (EAP) primarily to _______.

compress large multimedia streams

transport user credentials between supplicant and authentication server

assign IPv6 addresses to wireless clients

monitor SYN flood attempts on TCP 80

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A transparent firewall deployed “bump-in-the-wire” has which notable attribute?

Requires no change to existing IP addressing scheme

Must terminate VPN tunnels with IKEv2

Performs NAT from IPv4 to IPv6 automatically

Allows only inbound traffic to traverse VLAN trunks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?