history of architecture

history of architecture

KG

11 Qs

quiz-placeholder

Similar activities

SISTEMAS OPERATIVOS

SISTEMAS OPERATIVOS

3rd Grade

10 Qs

SRWE - Module 6 - EtherChannel

SRWE - Module 6 - EtherChannel

Professional Development

14 Qs

REGRESO A CLASES COMPUTACIÓN KINDER III

REGRESO A CLASES COMPUTACIÓN KINDER III

KG

10 Qs

Bài kiểm tra về hệ điều hành

Bài kiểm tra về hệ điều hành

KG

12 Qs

Papelera/Sistemas operativos, 4to grado

Papelera/Sistemas operativos, 4to grado

4th Grade

10 Qs

Cookery 8

Cookery 8

7th - 8th Grade

13 Qs

Generación de los Computadores

Generación de los Computadores

6th Grade

11 Qs

CCNA - SRWE - 3.6.4

CCNA - SRWE - 3.6.4

University

15 Qs

history of architecture

history of architecture

Assessment

Quiz

Instructional Technology

KG

Medium

Created by

Dave Bautista

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

  • DHCP Snooping

  • IP Source Guard

  • Dynamic ARP Inspection

  • Port Security

  • Web Security Appliance

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two load balancing methods can be implemented with EtherChannel technology? (Choose two.)

  • destination MAC to destination IP

  • destination IP to destination MAC

  • source MAC to destination MAC

  • source IP to destination IP

  • destination MAC to source MAC

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)

The network administrator can apply port security to dynamic access ports

The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.

The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

The network administrator can apply port security to EtherChannels.

When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)

  • between two switches that utilize multiple VLANs

  • between a switch and a client PC

  • between a switch and a server that has an 802.1Q NIC

  • between a switch and a network printer

  • between two switches that share a common VLAN

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two mode combinations would result in the successful negotiation of an EtherChannel? (Choose two.)

  • auto; auto

  • active; passive

  • desirable; desirable

  • desirable; active

  • passive; auto

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)

  • SSH

  • HTTPS

  • TACACS+

  • RADIUS

  • CHAP

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three statements accurately describe VLAN types? (Choose three).

  • A management VLAN is any VLAN that is configured to access management features of the switch.

  • A data VLAN is used to carry VLAN management data and user-generated traffic.

  • After the initial boot of an unconfigured switch, all ports are members of the default VLAN. 

  • An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.

  • Voice VLANs are used to support user phone and e-mail traffic on a network.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?