Where do many network attacks originate?, Only from the internet, Inside the network, Only from IoT devices, Only from cloud systems, Why is securing the internal LAN important?, It increases download speed, Users can still face threats and outages, It lowers electricity costs, It replaces the firewall, What can happen after an internal host is infiltrated?, It becomes a starting point for attacking critical systems, It deletes itself, It automatically updates security, Nothing, Which systems could be targeted after an internal device is compromised?, Only printers, Only laptops, Servers and sensitive information, Only IoT cameras, Securing the internal LAN is:, Not necessary if you have a firewall, Nearly as important as securing the network perimeter, Only needed for large companies, Only for wireless networks, What are two main internal LAN elements that must be secured?, Endpoints and network infrastructure, Routers and cables, Websites and browsers, Cloud and email, Which of the following is considered an endpoint?, Laptop, Email server, Printer, All of the above, Network infrastructure devices typically include:, Switches and wireless devices, Only printers, Only laptops, Web browsers, Which is an example of a LAN-related attack?, MAC address table overflow, Screenshot capture, Password reset, File compression, If one internal host becomes infected, what is a major risk?, It slows down one computer only, It spreads malware to other devices, It increases Wi-Fi signal, It upgrades the firewall.

Antimalware Protection

Leaderboard

Visual style

Options

Switch template

)
Continue editing: ?