
history of architecture
Authored by Dave Bautista
Instructional Technology
KG
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)
DHCP Snooping
IP Source Guard
Dynamic ARP Inspection
Port Security
Web Security Appliance
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which two load balancing methods can be implemented with EtherChannel technology? (Choose two.)
destination MAC to destination IP
destination IP to destination MAC
source MAC to destination MAC
source IP to destination IP
destination MAC to source MAC
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)
The network administrator can apply port security to dynamic access ports
The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
The network administrator can apply port security to EtherChannels.
When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)
between two switches that utilize multiple VLANs
between a switch and a client PC
between a switch and a server that has an 802.1Q NIC
between a switch and a network printer
between two switches that share a common VLAN
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which two mode combinations would result in the successful negotiation of an EtherChannel? (Choose two.)
auto; auto
active; passive
desirable; desirable
desirable; active
passive; auto
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)
SSH
HTTPS
TACACS+
RADIUS
CHAP
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three statements accurately describe VLAN types? (Choose three).
A management VLAN is any VLAN that is configured to access management features of the switch.
A data VLAN is used to carry VLAN management data and user-generated traffic.
After the initial boot of an unconfigured switch, all ports are members of the default VLAN.
An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.
Voice VLANs are used to support user phone and e-mail traffic on a network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?