(Part 1) Modules 10 – 13: L2 Security and WLANs

(Part 1) Modules 10 – 13: L2 Security and WLANs

University

28 Qs

quiz-placeholder

Similar activities

EC8702_Adhoc & Wireless sensor network_Quiz-V

EC8702_Adhoc & Wireless sensor network_Quiz-V

University

30 Qs

UNIT V 4G & Beyond

UNIT V 4G & Beyond

University

30 Qs

Quiz MCommerce-1

Quiz MCommerce-1

University

25 Qs

(Part 3) Modules 10 – 13: L2 Security and WLANs

(Part 3) Modules 10 – 13: L2 Security and WLANs

University

26 Qs

linux command

linux command

University

25 Qs

QUIZOPHILE

QUIZOPHILE

University

25 Qs

Telecommunication and Network

Telecommunication and Network

University

30 Qs

Ulangan Harian

Ulangan Harian

University

25 Qs

(Part 1) Modules 10 – 13: L2 Security and WLANs

(Part 1) Modules 10 – 13: L2 Security and WLANs

Assessment

Quiz

Other

University

Easy

Created by

awit yawa

Used 11+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

  • ARP spoofing

  • DHCP starvation

  • IP address spoofing

  • MAC address flooding

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

  • Disable DTP.

  • Disable STP.

  • Enable port security.

  • Place unused ports in an unused VLAN.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three Cisco products focus on endpoint security solutions? (Choose three.)

  • IPS Sensor Appliance

  • Web Security Appliance

  • Email Security Appliance

  • SSL/IPsec VPN Appliance

  • NAC Appliance

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

  • true

  • false

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

  • server-based AAA over TACACS+

  • local AAA over RADIUS

  • server-based AAA

  • local AAA over TACACS+

  • local AAA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

  • Enable CDP on edge devices, and enable LLDP on interior devices.

  • Use the open standard LLDP rather than CDP.

  • Use the default router settings for CDP and LLDP.

  • Disable both protocols on all interfaces where they are not required.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

  • SNMP

  • TFTP

  • SSH

  • SCP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?