Networking

A detailed diagram illustrating network security concepts including routing protocols, DHCP, ARP spoofing, and VLAN management, with a professional and educational design

Networking Security Quiz

Test your knowledge on networking security with our comprehensive quiz designed for both beginners and seasoned professionals. This quiz covers a wide range of topics related to routing protocols, network attacks, and mitigation strategies.

Key Topics Include:

  • Routing Protocol Vulnerabilities
  • Network Attack Mitigation Techniques
  • Security Best Practices
25 Questions6 MinutesCreated by ProtectingNetwork12
What is the problem with BGP?
Does not have a built-in mechanism to prevent errors from peers
Does not have a mechanism to protect against the deletion or forging of data
Does not have a global view of correct routing information to allow detection of invalid routes
All of the above
How can BGP attack be prevented? Choose all that apply.
Use peer authentication with MD5
Use route filtering on inbound announcements
Use Version 2
Use Split Horizon Routing
How can RIP attacks be mitigated? Choose all that apply
Use Version 2
Use Complex passwords for authentication
Use a different routing protocol if possible
All of the above
How can an OSPF attack be mitigated?
Use authentication
Use passive-interface
Use complex passwords for authentication
All of the above
What is the maximum number of hops in RIP?
10
15
30
45
What is a hold down timer?
A timer for the next routing update
A timer to prevent conflicting routing update
A default timer set to 60 seconds
A timer to keep the router interface in the Down state
How does RIP send update to other routers?
Broadcast in Version 1. Broadcast in Version 2.
Multicast in version 1, multicast in version 2
Broadcast in version 1, multicast in version 2
Multicast in version 1, broadcast in version 2
What is RIP?
Rest in Peace protocol
Routing information protocol
A maximum of 16 hops
Link-state routing protocol
Why is RIP version 1 vulnerable to network attacks?
It is an old routing protocol
It sends updates every 60 seconds
It uses multicast for routing updates
It does not support authentication
What is "split horizon" in RIP
A) A rule to split traffic to different hops
A rule to divide the network verticals
A rule to prevent routing loop
None of the above
Which OSI Layer does VLAN hopping belong to?
1
2
3
4
What is vlan hopping?
Routing between different VLANS
Putting two VLAN's on the same network
Switching to another VLAn with double tagging
All of the Above
None of the above
What is required for vlan hopping using a trunk port?
Ending packets using a different VLAN tag than what is assigned on the access port
Having physical access to the switch port
Posing as a switch and negotiating a trunk
All of the above
None of the above
. How can VLAN hopping using a trunk port be prevented? Choose all that apply
Configure unised network ports to shutdown
Configure non-trunking ports as access ports explicitly
COnfigure VLan Hopping detection on switch ports
Configure the VTP Porotocol on trunk ports
What is MAC Address spoofing?
Osing as a different network node by spoofing a different MAC address
It is the basis for higher level attacks
It is a later 2 attack
All of the above
None of the above
How can MAC address spoofing be prevented? Choose all that apply
Configure MAC address anti-spoofing on siwtchports
Configure port security on all access ports
Configure violation types and aging timers
All of the above
None of the above
What is DHCP Starvation ( I think this is the right answer...?)
A layer 4 network attack
An attack on a DHCP server
An attack that exhausts all DHCP client IPS from DHCP server
Relies on MAC address spoofing
All of the above
None of the above
How can DHCP starvation be prevented?
Mitigate MAC address spoofing
Increase the number of available DHCP Client IPs
Create network segmentation
All of the above
None of the above
What is DHCP server spoofing?
Osing as a DHCP server to handle DHCP requests
Offering illegitimate information like DNS , gateway, and WPAD configuration for the purpose of network attacks
An attack that requires a DHCP Starvation attack
All of the above
None of the above
How can DHCP server spoofing be prevented?
Use DHCP spoofing
Mitigate DHCP starvation attacks
Se DHCP sensors on the network
All of the above
None of the above
What is ARP Spoofing?
A layer 2 attack
Takes over traffic for the targeted IP address
Use MAC address spoofing
All of the above
None of the above
How can arp spoofing be mitigated? Choose all that apply
Use ARP Spoofing detection
Mitigate MAC address spoofing
Use Dynamic ARP inspection
All of the Above
None of the above
What is IP Spoofing?
Highjacking another physical address
Highjacking another logical address
Using G-arp as an attack vector
All of the above
How can IP spoofing be mitigated?
Use Safeguard to restrict traffic
Stop ARP spoofing attacks
Stop DHCP Spoofing attacks
Use G-ARP guards to mitigate
What are different types of ports in a private VLAN? Choose all that apply
Isolated
Promiscuous
Community
Public
{"name":"Networking", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on networking security with our comprehensive quiz designed for both beginners and seasoned professionals. This quiz covers a wide range of topics related to routing protocols, network attacks, and mitigation strategies.Key Topics Include:Routing Protocol VulnerabilitiesNetwork Attack Mitigation TechniquesSecurity Best Practices","img":"https:/images/course3.png"}
Powered by: Quiz Maker