
Part 4.3
Authored by Kirk Marshall
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following actions best demonstrates device hardening on a network switch?
Installing additional RAM modules
Disabling unused ports and services
Increasing the screen brightness
Changing the device’s color
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator is setting up a new router. Which step should they take to improve security during initial configuration?
Leave the default password unchanged
Change the default password to a strong, unique one
Share the default password with all users
Disable all network interfaces
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does enabling port security on a switch help protect the network?
It increases the speed of data transmission
It restricts access to the network based on device MAC addresses
It allows unlimited devices to connect to each port
It disables all ports by default
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When implementing 802.1X authentication, what is the primary benefit for network security?
It allows any device to connect without credentials
It authenticates devices before granting network access
It increases wireless signal strength
It disables encryption on the network
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a MAC filtering strategy?
Allowing only devices with specific MAC addresses to connect
Assigning static IP addresses to all devices
Using only wireless connections
Disabling DHCP on the network
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company wants to prevent unauthorized devices from connecting to its network. Which network access control method should they implement?
Port security
Open Wi-Fi access
Disabling all firewalls
Using default device settings
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of using an Access Control List (ACL) on a router?
To filter network traffic based on defined rules
To increase the router’s processing speed
To automatically update firmware
To provide wireless connectivity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Round-1 Technical Aptitude
Quiz
•
11th Grade - Professi...
16 questions
CPU scheduling
Quiz
•
Professional Development
20 questions
DBMS-QUIZ
Quiz
•
Professional Development
20 questions
PC Troubleshooting
Quiz
•
Professional Development
20 questions
U.T. 7: Configuración de Routers y Encaminamiento
Quiz
•
Professional Development
20 questions
MS OFFICE QUIZ 01
Quiz
•
Professional Development
15 questions
JS
Quiz
•
Professional Development
20 questions
Technology
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development