Section 3.5 Demonstrate your acquired knowledge about Network Access & Management. This will demonstrate your proficiency for section 3.5 of the Network+ 10-009 objectives. 1 / 25 A company uses a jump host inside its DMZ. What’s the security benefit of this setup? Encrypts local traffic Limits direct access to internal systems Prevents VPN access Eliminates need for user authentication 2 / 25 What feature would a GUI likely offer that a CLI would not? Secure channel DHCP configuration Visual charts or dashboards SSH tunneling 3 / 25 What makes out-of-band management more secure than in-band in many cases? It uses a separate management network It encrypts more traffic It requires dual authentication It supports only IPv6 4 / 25 Which access method is most commonly used for emergency access to a router when remote connections fail? Web interface Jump box Console cable SSH 5 / 25 Which management method can enable a script to update firewall rules automatically based on cloud platform events? SSH Console port Telnet API integration 6 / 25 What is one potential risk of using split tunnel VPNs? Users may bypass corporate security for Internet access DNS may resolve faster All data is forced through internal servers SLAAC is disabled 7 / 25 In which scenario is a client-to-site VPN most appropriate? Linking two corporate data centers Allowing remote employees secure access to internal resources Hosting a public website Encrypting backup traffic between servers 8 / 25 What protocol is typically used for secure console access over the network? FTP SSH HTTP DHCP 9 / 25 Which of the following scenarios would benefit most from out-of-band management? Software updates IP address assignment A device has lost network connectivity and needs recovery SNMP trap configuration 10 / 25 Out-of-band management typically involves: SSH access over the production network DNS-based monitoring Separate management interfaces and paths Web-based login portals 11 / 25 A drawback of in-band management is: It requires physical access It may become unavailable if the network goes down It uses non-standard protocols It requires a dedicated circuit 12 / 25 Which of the following best describes in-band management? Uses the same network used for normal traffic Requires a separate network path Can only be used when the primary network fails Only uses a serial console connection 13 / 25 What is a common use case for a jump host? Resolving DNS queries Securely accessing devices in a restricted network segment Syncing NTP servers Capturing packets remotely 14 / 25 What type of system is placed between users and devices to restrict direct access and improve security? DMZ switch Jump box/Jump host DNS proxy Load balancer 15 / 25 Which of the following allows direct command-line access to a device without using a network connection? SSH Console port GUI API 16 / 25 APIs are often used in network management to: Provide GUI access to routers Create encrypted tunnels Automate and script configuration changes programmatically Replace SSH 17 / 25 Which method provides a user-friendly interface for remote network device configuration? SSH Console cable Graphical User Interface (GUI) SNMP 18 / 25 What is a key advantage of using SSH over Telnet? Telnet supports file transfer SSH encrypts all communication SSH requires no authentication Telnet is faster 19 / 25 Which of the following remote access methods provides encrypted command-line access? Telnet SSH HTTP SNMP 20 / 25 One downside of using a full tunnel VPN is: Lack of encryption It bypasses corporate monitoring Increased latency and bandwidth usage No access to local network 21 / 25 Which VPN method allows users to access applications through a browser without installing VPN software? Split tunnel Clientless VPN Full tunnel IPsec 22 / 25 A full tunnel VPN sends: Internal traffic through the VPN only All user traffic, including Internet-bound traffic, through the VPN Only DNS queries through the VPN Traffic to the local subnet through the VPN 23 / 25 Which of the following is a benefit of a split tunnel VPN configuration? Reduces bandwidth usage on the VPN All traffic is routed through the corporate firewall Eliminates the need for encryption Ensures central monitoring of all traffic 24 / 25 What is a key difference between site-to-site and client-to-site VPNs? Site-to-site requires user authentication Client-to-site VPN connects individual devices to a corporate network Site-to-site supports mobile users Client-to-site lacks encryption 25 / 25 Which type of VPN is commonly used to securely connect two separate physical office networks over the Internet? Client-to-site VPN Site-to-site VPN Full tunnel VPN SSL VPN Your score is 0% Restart quiz Return to CompTia N+ 10-009 Objectives