(Part 2) Modules 10 – 13: L2 Security and WLANs

(Part 2) Modules 10 – 13: L2 Security and WLANs

University

30 Qs

quiz-placeholder

Similar activities

COVID-19 QUIZIZZ MEDSOC RCMP

COVID-19 QUIZIZZ MEDSOC RCMP

University

25 Qs

Aptiverse - Spectra 2k24 Round 1 Room 5

Aptiverse - Spectra 2k24 Round 1 Room 5

University

25 Qs

CLOUD COMPUTING

CLOUD COMPUTING

University

25 Qs

Quizizz Mitologi Yunani Perang Troya

Quizizz Mitologi Yunani Perang Troya

University

25 Qs

Most popular boy names

Most popular boy names

3rd Grade - Professional Development

26 Qs

Chunin exams l 3rd exam

Chunin exams l 3rd exam

3rd Grade - University

26 Qs

Arduino

Arduino

University

25 Qs

Advanced Game Design Midterm

Advanced Game Design Midterm

University

25 Qs

(Part 2) Modules 10 – 13: L2 Security and WLANs

(Part 2) Modules 10 – 13: L2 Security and WLANs

Assessment

Quiz

Other

University

Practice Problem

Easy

Created by

awit yawa

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

  • DHCP Snooping

  • IP Source Guard

  • Dynamic ARP Inspection

  • Port Security

  • Web Security Appliance

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three techniques for mitigating VLAN attacks? (Choose three.)

  • Enable trunking manually.

  • Disable DTP.

  • Enable Source Guard.

  • Set the native VLAN to an unused VLAN.

  • Use private VLANs.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Refer to the exhibit. What can be determined about port security from the information that is shown?

  • The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is configured for port security.

  • The port has been shut down.

  • The port violation mode is the default for any port that has port security enabled.

  • The port has two attached devices.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

  • AAA

  • NAT

  • RADIUS

  • SNMP

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

  • Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.

  • Update the firmware on the new router.

  • Configure devices to use a different channel.

  • Change the SSID.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

  • improperly configured devices

  • rogue access points

  • accidental interference

  • interception of data

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the function provided by CAPWAP protocol in a corporate wireless network?

  • CAPWAP creates a tunnel on Transmission Control Protocol (TCP) ports in order to allow a WLC to configure an autonomous access point.

  • CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.

  • CAPWAP provides connectivity between an access point using IPv6 addressing and a wireless client using IPv4 addressing.

  • CAPWAP provides the encryption of wireless user traffic between an access point and a wireless client.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?