Semi-Final Exam

Semi-Final Exam

University

40 Qs

quiz-placeholder

Similar activities

TEKNOLOGI WAN 2019 XI _ SATRIYO

TEKNOLOGI WAN 2019 XI _ SATRIYO

University

40 Qs

DECENT WORK EMPLOYMENT (1)

DECENT WORK EMPLOYMENT (1)

University

44 Qs

UNITED NATIONS

UNITED NATIONS

KG - University

45 Qs

KomJarDas 2 Perakitan Komputer

KomJarDas 2 Perakitan Komputer

1st Grade - University

38 Qs

แบบทดสอบวิชาไมโครคอนโทรลเลอร์

แบบทดสอบวิชาไมโครคอนโทรลเลอร์

KG - Professional Development

45 Qs

Shipping and Maritime Law - Assessment 2

Shipping and Maritime Law - Assessment 2

University

41 Qs

Logistics Environment I & II - Security

Logistics Environment I & II - Security

9th Grade - Professional Development

35 Qs

Peraturan Penerbangan

Peraturan Penerbangan

University

35 Qs

Semi-Final Exam

Semi-Final Exam

Assessment

Quiz

Other

University

Hard

Created by

Alma Alid-ab

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Layer 2 attack will result in a switch flooding incoming frames to all ports?

MAC address overflow

Spanning Tree Protocol manipulation

IP address spoofing

ARP poisoning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

HTTP

LLDP

CDP

FTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is authentication with AAA preferred over a local database method?

It specifies a different password for each line or port.

It requires a login and password combination on the console, vty lines, and aux ports.

It provides a fallback authentication method if the administrator forgets the username or password.

It uses less network bandwidth.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server?

SSH

802.1x

RADIUS

TACACS

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which Cisco solution helps prevent MAC and IP address spoofing attacks?

Dynamic ARP Inspection

IP Source Guard

Port Security

DHCP Snooping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

false

true

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Enable port security

Disable DTP

Disable STP

Place unused ports in an unused VLAN

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?