Part 4.3

Part 4.3

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cloud services

Cloud services

Professional Development

20 Qs

A+ - 18A - Configure mobile OS security

A+ - 18A - Configure mobile OS security

Professional Development

21 Qs

Final practice test mod 7

Final practice test mod 7

Professional Development

17 Qs

ITF+ Ch8, Network Concepts & Technologies

ITF+ Ch8, Network Concepts & Technologies

Professional Development

20 Qs

Control Panel Quiz

Control Panel Quiz

5th Grade - Professional Development

20 Qs

Security Domain

Security Domain

Professional Development

20 Qs

AWS-Basics

AWS-Basics

Professional Development

20 Qs

Security+ 701 - Quiz 2

Security+ 701 - Quiz 2

Professional Development

15 Qs

Part 4.3

Part 4.3

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Kirk Marshall

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following actions best demonstrates device hardening on a network switch?

Installing additional RAM modules

Disabling unused ports and services

Increasing the screen brightness

Changing the device’s color

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is setting up a new router. Which step should they take to improve security during initial configuration?

Leave the default password unchanged

Change the default password to a strong, unique one

Share the default password with all users

Disable all network interfaces

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does enabling port security on a switch help protect the network?

It increases the speed of data transmission

It restricts access to the network based on device MAC addresses

It allows unlimited devices to connect to each port

It disables all ports by default

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When implementing 802.1X authentication, what is the primary benefit for network security?

It allows any device to connect without credentials

It authenticates devices before granting network access

It increases wireless signal strength

It disables encryption on the network

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a MAC filtering strategy?

Allowing only devices with specific MAC addresses to connect

Assigning static IP addresses to all devices

Using only wireless connections

Disabling DHCP on the network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company wants to prevent unauthorized devices from connecting to its network. Which network access control method should they implement?

Port security

Open Wi-Fi access

Disabling all firewalls

Using default device settings

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using an Access Control List (ACL) on a router?

To filter network traffic based on defined rules

To increase the router’s processing speed

To automatically update firmware

To provide wireless connectivity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?