Important Instructions:
- Total Number Of Questions : 10
- Passing Marks : 7
- Each Question Carry 1 Mark, No Negative Marking.
- Do Not Refresh The Page.
- This Is A FREE Online Test, DO NOT Pay Money To Anyone To Attend This Test.
- Best Of Luck…
Results
-
Congratulation…
You Have Passed The Test, You Should Try To The Next One…!!
Unfortunately…
You Did Not Pass. Why Not Try It Again?
#1. Which of the following is not a best practice for secure router configuration?
#2. When enabling port security on a switch interface, traffic is usually restricted based on:
#3. Network separation is used primarily to:
#4. A unified threat management appliance would most likely be placed:
#5. You’ve been asked to help configure a router that is used to connect a remote branch office to your corporate headquarters. The router will need to be managed remotely from the corporate headquarters. Which of the following protocols would you recommend be used to manage the remote router?
#6. You are enabling port security on a switch that handles connections for your company’s customer help desk. Company policy prohibits employees from connecting personal devices to the corporate network. To help ensure that only corporate computer systems are connected, what type of port security would you select?
#7. Your company has a policy to not allow any connection from overseas addresses to its network. Which security mechanism is best to employ to accomplish this goal?
#8. During your investigation of a security breach, you discover the corporate fileserver is connected to a VLAN that is accessible to systems in the development environment. This violates which security principle?
![](https://www.learningwerning.com/wp-content/uploads/2022/01/Network-Security-mcq-questions-with-answer-3-9.jpg)