SWRE Unit 10

SWRE Unit 10

University

10 Qs

quiz-placeholder

Similar activities

Quiz No. 4 - Finals

Quiz No. 4 - Finals

University

10 Qs

Network Quiz

Network Quiz

University

10 Qs

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

University

9 Qs

Chapter 8

Chapter 8

University

10 Qs

Programming Language Constructs

Programming Language Constructs

University

15 Qs

UTB - FCNS 221PB

UTB - FCNS 221PB

University

10 Qs

Quiz No. 2

Quiz No. 2

University

10 Qs

Vocational English for Game Design

Vocational English for Game Design

University

10 Qs

SWRE Unit 10

SWRE Unit 10

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Bruce (BCollier)

Used 13+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Cisco solution helps prevent ARP spoofing and ARP poisoning attacks?

  • Dynamic ARP Inspection

  • IP Source Guard

  • DHCP Snooping

  • Port Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique would prevent rogue servers from providing false IPv6 configuration parameters to clients?

  • enabling RA Guard

  • enabling DHCPv6 Guard

  • implementing port security on edge ports

  • disabling CDP on edge ports

Answer explanation

DHCPv6 Guard is a feature designed to ensure that rogue DHCPv6 servers are not able to hand out addresses to clients, redirect client traffic, or starve out the DHCPv6 server and cause a DoS attack. DHCPv6 Guard requires a policy to be configured in DHCP Guard configuration mode, and DHCPv6 Guard is enabled on an interface-by-interface basis.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method to launch a VLAN hopping attack?

  • sending spoofed native VLAN information

  • sending spoofed IP addresses from the attacking host

  • introducing a rogue switch and enabling trunking

  • flooding the switch with MAC addresses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity analyst is using the macof tool to evaluate configurations of switches deployed in the backbone network of an organization. Which type of LAN attack is the analyst targeting during this evaluation?

  • VLAN hopping

  • DHCP spoofing

  • MAC address table overflow

  • VLAN double-tagging

Answer explanation

Macof is a network attack tool and is mainly used to flood LAN switches with MAC addresses.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network attack is mitigated by enabling BPDU guard?

  • rogue DHCP servers on a network

  • MAC address spoofing

  • CAM table overflow attacks

  • rogue switches on a network

Answer explanation

There are several recommended STP stability mechanisms to help mitigate STP manipulation attacks:
PortFast – used to immediately bring an interface configured as an access or trunk port to the forwarding state from a blocking state. Applied to all end-user ports.
BPDU guard – immediately error-disables a port that receives a BPDU. Applied to all end-user ports.The receipt of BPDUs may be part of an unauthorized attempt to add a switch to the network.
Root guard – prevents a switch from becoming the root switch. Applied to all ports where the root switch should not be located.
Loop guard – detects unidirectional links to prevent alternate or root ports from becoming designated ports. Applied to all ports that are or can become nondesignated.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator has found a user sending a double-tagged 802.1Q frame to a switch. What is the best solution to prevent this type of attack?

  • The native VLAN number used on any trunk should be one of the active data VLANs.

  • The VLANs for user access ports should be different VLANs than any native VLANs used on trunk ports.

  • Trunk ports should be configured with port security.

  • Trunk ports should use the default VLAN as the native VLAN number.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the AAA process, when will authorization be implemented?

  • Immediately after the determination of which resources a user can access

  • Immediately after an AAA client sends authentication information to a centralized server

  • Immediately after successful authentication against an AAA data source

  • Immediately after AAA accounting and auditing receives detailed reports

Answer explanation

AAA authorization is implemented immediately after the user is authenticated against a specific AAA data source.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?