Final 16

A futuristic cyber security concept illustration, featuring a digital network landscape with locks and shields integrated into the design, symbolizing protection and security in network systems.

Network Security Challenge: Test Your Knowledge

Welcome to the ultimate network security quiz designed for IT professionals and enthusiasts! This quiz contains 10 challenging questions that cover various aspects of networking and security protocols.

  • Multiple-choice and checkbox questions
  • Test your knowledge on OSPF, ACLs, and more
  • Ideal for students and certification seekers
10 Questions2 MinutesCreated by AnalyzingData12
A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as Nmap, SuperScan, and Angry IP Scanner?
To detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
To detect any evidence of a hack or malware in a computer or network
To reverse engineer binary files when writing exploits and when analyzing malware
To probe network devices, servers, and hosts for open TCP or UDP ports
An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.16.91.0 255.255.255.192. What wildcard mask would the administrator use in the OSPF network statement?
0.0.31.255
0.0.0.63
0.0.15.255
0.0.7.255
What type of traffic is described as requiring latency to be no more than 400 milliseconds (ms)?
Video
Data
Voice
Refer to the exhibit. Which two configurations would be used to create and apply a standard access list on R1, so that only the 10.0.70.0/25 network devices are allowed to access the internal database server? (Choose two.)
R1(config)# interface GigabitEthernet0/0 R1(config-if)# ip access-group 5 out
R1(config)# access-list 5 permit 10.0.54.0 0.0.1.255
R1(config)# interface Serial0/0/0 R1(config-if)# ip access-group 5 in
R1(config)# access-list 5 permit 10.0.70.0 0.0.0.127
R1(config)# access-list 5 permit any
A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.)
Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0
Router(config)# access-list 95 permit any
Router(config)# access-list 95 host 172.16.0.0
Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255
Router(config)# access-list 95 172.16.0.0 255.255.255.255
Router(config)# access-list 95 deny any
Refer to the exhibit. The company has decided that no traffic initiating from any other existing or future network can be transmitted to the Research and Development network. Furthermore, no traffic that originates from the Research and Development network can be transmitted to any other existing or future networks in the company. The network administrator has decided that extended ACLs are better suited for these requirements. Based on the information given, what will the network administrator do?
One ACL will be placed on the R1 Gi0/0 interface and one ACL will be placed on the R2 Gi0/0 interface.
Only a numbered ACL will work for this situation.
One ACL will be placed on the R2 Gi0/0 interface and one ACL will be placed on the R2 S0/0/0 interface.
Two ACLs (one in each direction) will be placed on the R2 Gi0/0 interface.
What protocol uses smaller stratum numbers to indicate that the server is closer to the authorized time source than larger stratum numbers?
TFTP
SYSLOG
NTP
MPLS
Refer to the exhibit. If no router ID was manually configured, what would router Branch1 use as its OSPF router ID?
10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1
Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco.com is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)
The web server at 192.168.0.10 is reachable from the source host.
The default gateway between the source host and the server at 192.168.0.10 is down.
There is a problem with the web server software on web-s1.cisco.com.
A router is down between the source host and the server web-s1.cisco.com.
DNS cannot resolve the IP address for the server web-s1.cisco.com.
What type of traffic is described as tending to be unpredictable, inconsistent, and bursty?
Video
Voice
Data
{"name":"Final 16", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Welcome to the ultimate network security quiz designed for IT professionals and enthusiasts! This quiz contains 10 challenging questions that cover various aspects of networking and security protocols.Multiple-choice and checkbox questionsTest your knowledge on OSPF, ACLs, and moreIdeal for students and certification seekers","img":"https:/images/course7.png"}
Powered by: Quiz Maker