Part 1.8

Part 1.8

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

A+ - 18C - Troubleshoot Mobile OS and App Security

A+ - 18C - Troubleshoot Mobile OS and App Security

Professional Development

23 Qs

Part 5.4

Part 5.4

Professional Development

15 Qs

A+ - 10B - Configure Windows System Settings

A+ - 10B - Configure Windows System Settings

Professional Development

17 Qs

Part 3.2

Part 3.2

Professional Development

20 Qs

Part 4.1

Part 4.1

Professional Development

20 Qs

Part 4.2

Part 4.2

Professional Development

20 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Part 1.8

Part 1.8

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Kirk Marshall

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a primary benefit of implementing Software-Defined Networking (SDN) in a modern network environment?

It eliminates the need for any physical network hardware.

It allows centralized management and automation of network resources.

It increases network latency by adding more control layers.

It restricts network scalability to small environments.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When deploying SD-WAN, which strategy helps optimize application performance across multiple branch locations?

Using a single static route for all traffic

Dynamically selecting the best available WAN link based on real-time conditions

Disabling all security features to reduce overhead

Relying solely on MPLS circuits

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does VXLAN address the limitations of traditional VLANs in large-scale data centers?

By reducing the number of available VLAN IDs

By supporting up to 16 million logical networks over a shared infrastructure

By eliminating the need for any encapsulation

By restricting network segmentation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle is central to Zero Trust Architecture (ZTA)?

Trusting all devices inside the corporate network

Never trust, always verify, regardless of network location

Allowing unrestricted access to internal resources

Using only perimeter-based security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a core component of Secure Access Service Edge (SASE)?

Physical firewalls only

Cloud-delivered security services integrated with wide area networking

Manual configuration of all network devices

On-premises-only access control

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In SD-WAN environments, which approach enhances network security for remote branches?

Disabling encryption to improve speed

Integrating security policies and traffic inspection at the edge

Allowing all traffic without inspection

Using only a single ISP connection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Infrastructure as Code (IaC) improve network management?

By requiring manual configuration of each device

By enabling automated, repeatable deployment of network resources using code

By limiting network changes to once per year

By removing the need for version control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?