
Day 1 – Network Security Technologies Quiz
Authored by Suthida Pattanusorn
Other
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
1. For the same MAC address, a manually configured has a higher priority than an automatically generated MAC entry.
A. True
B. False
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
2. DHCP snooping is a security feature that can be used to defend against various attacks. Which of the following are included in those attacks? (Multiple Answers)
A. TCP flag attacks
B. Bogus DHCP server attacks
C. Man-in-the-middle attacks and IP/MAC spoofing attacks
D. Starvation attacks by changing the CHADDR field value
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
3. Which of the following statements about IPSG is incorrect?
A. IPSG is a source IP address filtering technology based on Layer 3 interfaces.
B. IPSG can be used to prevent hosts from changing IP addresses.
C. IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.
D. IPSG can defend against IP address spoofing attacks.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
4. Which of the following statements is incorrect about the user authentication points on the network?
A. Deploying user authentication points at the access layer achieves granular permission management and high network security.
B. Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.
C. Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.
D. When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
5. In the firewall hot standby scenario, which of the following protocols is used to back up the session table between the active and standby firewalls?
A. BFD
B. HRP
C. VRRP
D. VGMP
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
6. To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.
A. TRUE
B. FALSE
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
7. If the number of MAC: addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take? (Multiple answers)
A. Sets the interface state to error-down and generates an alarm.
B. Discards packets with unknown source MAC addresses without generating any alarm.
C. Sets the interface state to error-down without generating any alarm.
D. Discards packets with unknown source MAC addresses and generates an alarm.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?