(Part 1) Modules 10 – 13: L2 Security and WLANs

(Part 1) Modules 10 – 13: L2 Security and WLANs

University

28 Qs

quiz-placeholder

Similar activities

BASIC CONFIG,SWITH & BRIDGE MIKROTIK

BASIC CONFIG,SWITH & BRIDGE MIKROTIK

University

30 Qs

แบบทดสอบ IoT

แบบทดสอบ IoT

University

25 Qs

CompTIA A+ 1001 Question Set B (PassCompTIA)

CompTIA A+ 1001 Question Set B (PassCompTIA)

9th Grade - Professional Development

24 Qs

(Part 2) Modules 10 – 13: L2 Security and WLANs

(Part 2) Modules 10 – 13: L2 Security and WLANs

University

30 Qs

Command OS 20200415

Command OS 20200415

University

25 Qs

QUIZZ AIJ XI TKJ - ROUTING STATIS

QUIZZ AIJ XI TKJ - ROUTING STATIS

KG - Professional Development

30 Qs

CCNA 1 ITNv6 Chapter 5

CCNA 1 ITNv6 Chapter 5

University

29 Qs

Cisco VLAN and Trunking Quiz

Cisco VLAN and Trunking Quiz

University

24 Qs

(Part 1) Modules 10 – 13: L2 Security and WLANs

(Part 1) Modules 10 – 13: L2 Security and WLANs

Assessment

Quiz

Other

University

Easy

Created by

awit yawa

Used 11+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

  • ARP spoofing

  • DHCP starvation

  • IP address spoofing

  • MAC address flooding

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

  • Disable DTP.

  • Disable STP.

  • Enable port security.

  • Place unused ports in an unused VLAN.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three Cisco products focus on endpoint security solutions? (Choose three.)

  • IPS Sensor Appliance

  • Web Security Appliance

  • Email Security Appliance

  • SSL/IPsec VPN Appliance

  • NAC Appliance

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

  • true

  • false

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

  • server-based AAA over TACACS+

  • local AAA over RADIUS

  • server-based AAA

  • local AAA over TACACS+

  • local AAA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

  • Enable CDP on edge devices, and enable LLDP on interior devices.

  • Use the open standard LLDP rather than CDP.

  • Use the default router settings for CDP and LLDP.

  • Disable both protocols on all interfaces where they are not required.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

  • SNMP

  • TFTP

  • SSH

  • SCP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?