
(Part 2) Modules 10 – 13: L2 Security and WLANs
Authored by awit yawa
Other
University
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)
DHCP Snooping
IP Source Guard
Dynamic ARP Inspection
Port Security
Web Security Appliance
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are three techniques for mitigating VLAN attacks? (Choose three.)
Enable trunking manually.
Disable DTP.
Enable Source Guard.
Set the native VLAN to an unused VLAN.
Use private VLANs.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Refer to the exhibit. What can be determined about port security from the information that is shown?
The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is configured for port security.
The port has been shut down.
The port violation mode is the default for any port that has port security enabled.
The port has two attached devices.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?
AAA
NAT
RADIUS
SNMP
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
Update the firmware on the new router.
Configure devices to use a different channel.
Change the SSID.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?
improperly configured devices
rogue access points
accidental interference
interception of data
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the function provided by CAPWAP protocol in a corporate wireless network?
CAPWAP creates a tunnel on Transmission Control Protocol (TCP) ports in order to allow a WLC to configure an autonomous access point.
CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.
CAPWAP provides connectivity between an access point using IPv6 addressing and a wireless client using IPv4 addressing.
CAPWAP provides the encryption of wireless user traffic between an access point and a wireless client.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?