CompTIA Network + 4.3 Network Security – Network Hardening Techniques

Posted by:

|

On:

|

Network Hardening Techniques

1 / 25

What network hardening technique involves isolating the control plane from data plane traffic on a router?

2 / 25

A company wants to isolate guest wireless network traffic from the internal network. Which technique should they use?

3 / 25

To ensure that network devices use strong and complex passwords, what should be implemented?

4 / 25

A network administrator wants to prevent a device from sending advertisements for a different subnet. Which technique should they use?

5 / 25

A company needs to ensure that only authorized DHCP servers can assign IP addresses on the network. Which feature should they enable?

6 / 25

A network administrator is concerned about the security of SNMP on their network devices. What best practice should they follow?

7 / 25

A company wants to restrict access to certain parts of their network based on the user’s role in the organization. Which access control method should they implement?

8 / 25

A network administrator needs to prevent unauthorized wireless clients from connecting to the company’s wireless network. Which method should they use?

9 / 25

What should a network administrator do to prevent unauthorized access to management interfaces on network devices?

10 / 25

To ensure that unused switch ports do not become a security risk, what should be done?

11 / 25

How can a network administrator prevent unauthorized access to the router’s control plane?

12 / 25

To prevent unauthorized changes to the network configuration, what type of access control should be implemented?

13 / 25

What is a critical step in securing network devices such as routers and switches to prevent unauthorized access?

14 / 25

You are tasked with preventing ARP spoofing attacks on your network. Which feature should you enable on the switch?

15 / 25

To ensure regular updates and security patches are applied to network devices, what practice should be followed?

16 / 25

A company wants to ensure that wireless network access is restricted to specific physical locations within their building. Which method should they use?

17 / 25

A network administrator needs to ensure that all devices in a specific VLAN can only communicate with each other and not with devices in other VLANs. Which feature should they configure?

18 / 25

Which practice involves verifying the integrity of ARP packets to prevent ARP spoofing attacks?

19 / 25

A company wants to ensure that their wireless network clients do not interfere with each other. Which practice should they implement?

20 / 25

What network security measure should be implemented to ensure that wireless clients cannot directly communicate with each other?

21 / 25

A company wants to segment its network to improve security and performance. Which technique allows for the creation of isolated sub-networks within a larger network?

22 / 25

Which network security practice involves setting up specific rules that explicitly allow or deny network traffic?

23 / 25

What should be done to prevent devices from obtaining incorrect IP addresses from unauthorized DHCP servers?

24 / 25

A company wants to ensure that devices connecting to the network use strong authentication methods. Which wireless security protocol should they implement?

25 / 25

A network administrator is configuring a switch to prevent unauthorized devices from connecting to the network. Which feature should they enable to restrict access based on MAC addresses?

Your score is

Exit