1/16
section 4.3
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
sample question
• Q: Which security practice reduces the attack surface of a network device?
▸ A: Device hardening
• Q: What switch feature limits the number of MAC addresses per port?
▸ A: Port security
• Q: Which protocol provides port-based authentication using a RADIUS server?
▸ A: 802.1X
• Q: Why is MAC filtering considered weak security?
▸ A: MAC addresses can be spoofed
• Q: Which security control filters traffic based on IP address and port?
▸ A: Access Control List (ACL)
• Q: What security zone is also known as a DMZ?
▸ A: Screened subnet
• Q: What is the first recommended step when securing a new network device?
▸ A: Change default passwords