Within a network, the security of the space within which the allowed computers are operating has to be secure to ensure that no unauthorized access is allowed. Networking 005 quizzes has more. All the best.
FTP
STP
UTP
RTP
Rate this question:
20
53
80
3389
Rate this question:
Channel
Encryption
SSID
DHCP scope
Rate this question:
Prevent network based attacks
Capture and analyze network traffic
Route IP packets to remote destinations
Record the switch ARP table
Rate this question:
802.11a
802.11b
802.11g
802.11n
Rate this question:
DNS suffixes
Leases
Static IP addressing
Reservations
Rate this question:
23
25
80
143
Rate this question:
2, 6, 10
1, 6, 11
1, 7, 10
1, 2, 3
Rate this question:
PPPoE
SIP
RSH
IPSec
Rate this question:
Satellite
ISDN
OC3
OC12
Rate this question:
Bus
Peer-to-peer
Ring
Star
Rate this question:
RAS
PPTP
IPSec
ICA
Rate this question:
DHCP
ARP
DNS
PING
Rate this question:
Transport
Application
Data Link
Network
Rate this question:
MAC filtering
SSL VPN
PPPoE
WPA Enterprise
Rate this question:
PoE
VLANs
MTU black hole
GBIC installation
WPA
Reduction of signal gain
Rate this question:
Email sending and receiving
Domain Name Service
FTP access to external servers
Remote desktop access
Rate this question:
Circuit gateway
Packet filter
Application level
Redundant firewall
Rate this question:
The signal strength has been degraded and latency is increasing hop count
An incorrect subnet mask has been entered in the WAP configuration
The signal strength has been degraded and packets are being lost.
Users have specified the wrong encryption type and routes are being rejected.
Rate this question:
PAT
Content filter
Implicit deny
NAT
Rate this question:
SC
RS-232
LC
RJ-45
Rate this question:
Environmental monitor
Cable tester
TDR
Loopback plug
Rate this question:
CAT5e
CAT6
Coaxial
Multimode fiber
Rate this question:
21
22
23
25
Rate this question:
Protocol analyzer
Time domain reflectometer
Toner probe
Multimeter
Rate this question:
Protocol analyzer
Toner probe
Cable certifier
Cable stripper
Rate this question:
Rogue access points
DoS attacks
Man-in-the-middle attacks
Phishing
Rate this question:
Wireless
Fiber
Coaxial
UTP
Rate this question:
Enable an SNMP agent
Enable network mapping
Set monitoring SSID
Select WPA2
Rate this question:
APIPA
Inactive lease
Reservations
Active lease
Rate this question:
The transport OSI model layer and the transport TCP/IP model layer
The transport OSI model layer and the Internet TCP/IP model layer
The network OSI model layer and the transport TCP/IP model layer
The network OSI model layer and the Internet TCP/IP model layer
Rate this question:
Intrusion detection software
PoE
Packet sniffer
Intrusion prevention software
Rate this question:
SSID
Encryption
Channels
Spectrum
Rate this question:
RTP
NTP
TFTP
ARP
Rate this question:
Conduct a vulnerability scan
Establish a network baseline
Conduct traffic analysis
Conduct a risk assessment
Rate this question:
QoS
POP3
PAT
SMTP
Rate this question:
Access point
Default gateway
IDF connection
Demarcation point
Rate this question:
10.0.0.100
172.168.0.100
169.254.0.100
192.168.0.100
Rate this question:
VLAN
VTP
Port security
QoS
Rate this question:
23
25
53
80
443
Rate this question:
DOCSIS
HDLC
SNMP
TACACS+
Rate this question:
Incorrect subnet mask
Incorrect DNS
Missing default gateway
Incorrect IPv6 address
Rate this question:
SSID masking
PPPOE
Transmission power
Encryption technology
Rate this question:
10GBaseLR
10GBaseSR
10GBaseX
10GBaseT
Rate this question:
Demarc extension
66 block
Patch panel
Vertical cross connect
Rate this question:
SSID should be changed daily and enabled.
WEP should be replaced with WPA encryption.
MAC filtering should be enabled and configured.
A different WAP manufacturer should be used to prevent commonly used security cracking techniques
Omni-directional antennas should be used to limit signal strength
Rate this question:
PoE
Port mirroring
Convergence
Port speed
Rate this question:
RJ-11
BNC
LC
DB-9
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.