A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?
(Part 3) Modules 10 – 13: L2 Security and WLANs

Quiz
•
Other
•
University
•
Easy
awit yawa
Used 14+ times
FREE Resource
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
off
restrict
protect
shutdown
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?
Add a Wi-Fi range extender to the WLAN and set the AP and the range extender to serve different bands.
Check and keep the firmware of the wireless router updated.
Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands.
Require all wireless devices to use the 802.11n standard.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which access control component, implementation, or protocol controls what users can do on the network?
accounting
802.1X
authorization
authentication
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which type of wireless network is suitable for providing wireless access to a city or district?
wireless wide-area network
wireless personal-area network
wireless local-area network
wireless metropolitan-area network
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?
MANAGEMENT
WIRELESS
WLANs
SECURITY
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?
Yagi
omnidirectional
dish
directional
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?
preventing buffer overflow attacks
preventing rogue switches from being added to the network
protecting against Layer 2 loops
enforcing the placement of root bridges
Create a free account and access millions of resources
Similar Resources on Quizizz
21 questions
DIT Lesson 3 Review

Quiz
•
9th Grade - University
21 questions
Data Link Layer

Quiz
•
University
30 questions
Brainiac Battle part 1

Quiz
•
University
30 questions
UNIT IV INTERNETWORKING BETWEEN WLANS AND WWANS

Quiz
•
University
25 questions
Unit 5 Computer Hardware

Quiz
•
9th Grade - University
25 questions
MWT .

Quiz
•
University
27 questions
ASESSEMENT AWAL SEMESTER

Quiz
•
12th Grade - University
21 questions
OSI Models

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade