Computer Hardware and Networking MCQ Quiz Hub

Network Security Multiple Choice questions

Choose a topic to test your knowledge and improve your Computer Hardware and Networking skills

Which of the following is true regarding access lists applied to an interface?





✅ Correct Answer: 3

Which command would you use to apply an access list to a router interface?





✅ Correct Answer: 3

Which of the following is an example of a standard IP access list?





✅ Correct Answer: 2

Which of the following is an example of a standard IP access list? A. B. C. D.





✅ Correct Answer: 2

You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?





✅ Correct Answer: 3

You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the commandshow running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?





✅ Correct Answer: 4

What command will permit SMTP mail to only host 1.1.1.1?





✅ Correct Answer: 4

You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?





✅ Correct Answer: 4

What router command allows you to determine whether an IP access list is enabled on a particular interface?





✅ Correct Answer: 3

You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router?





✅ Correct Answer: 3

You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?





✅ Correct Answer: 2

You configure the following access list: access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp access-list 110 deny tcp any eq 23 int ethernet 0 ip access-group 110 out What will the result of this access list be?





✅ Correct Answer: 4

You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?





✅ Correct Answer: 1

If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?





✅ Correct Answer: 3

Which router command allows you to view the entire contents of all access lists?





✅ Correct Answer: 3

Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?





✅ Correct Answer: 1

Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 1. 172.16.30.55 0.0.0.255 2. 172.16.30.55 0.0.0.0 3. any 172.16.30.55 4. host 172.16.30.55 5. 0.0.0.0 172.16.30.55 6. ip any 172.16.30.55





✅ Correct Answer: 2

If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?





✅ Correct Answer: 4

Which of the following series of commands will restrict Telnet access to the router?





✅ Correct Answer: 3

Which of the following commands connect access list 110 inbound to interface ethernet0?





✅ Correct Answer: 3

What is the standard IANA port number used for requesting web pages?





✅ Correct Answer: 1

A high profile company has been receiving a high volume of attacks on their website. The network administrator wants to be able to collect information on the attacker(s) so legal action can be taken. What should be implementated?





✅ Correct Answer: 2

What Directive would you use to block access to certain domains if you are using Apache as a proxy server?





✅ Correct Answer: 1

Wireless Application Protocol (WAP) has several layers. Which of the following is the security layer?





✅ Correct Answer: 3

Why would you configure virtual hosting with a single daemon rather than multiple daemons?





✅ Correct Answer: 2

Which of these is NOT a type of firewall?





✅ Correct Answer: 4

Are “Secure” servers really secured?





✅ Correct Answer: 4

As a security measure, you change the TCP port in FTP Site Properties to 19,960. Some users complain that they are unable to access the FTP site. What might be the cause of the problem?





✅ Correct Answer: 2

One way to limit hostile sniffing on a LAN (Local Area Network) is by installing:





✅ Correct Answer: 1

What does favicon.ico in a webserver’s log indicate?





✅ Correct Answer: 3

What does “chmod 1777 ./” do?





✅ Correct Answer: 4