Search Header Logo

history of architecture

Authored by Dave Bautista

Instructional Technology

KG

Used 3+ times

history of architecture
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

  • DHCP Snooping

  • IP Source Guard

  • Dynamic ARP Inspection

  • Port Security

  • Web Security Appliance

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two load balancing methods can be implemented with EtherChannel technology? (Choose two.)

  • destination MAC to destination IP

  • destination IP to destination MAC

  • source MAC to destination MAC

  • source IP to destination IP

  • destination MAC to source MAC

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)

The network administrator can apply port security to dynamic access ports

The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.

The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

The network administrator can apply port security to EtherChannels.

When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)

  • between two switches that utilize multiple VLANs

  • between a switch and a client PC

  • between a switch and a server that has an 802.1Q NIC

  • between a switch and a network printer

  • between two switches that share a common VLAN

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two mode combinations would result in the successful negotiation of an EtherChannel? (Choose two.)

  • auto; auto

  • active; passive

  • desirable; desirable

  • desirable; active

  • passive; auto

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)

  • SSH

  • HTTPS

  • TACACS+

  • RADIUS

  • CHAP

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three statements accurately describe VLAN types? (Choose three).

  • A management VLAN is any VLAN that is configured to access management features of the switch.

  • A data VLAN is used to carry VLAN management data and user-generated traffic.

  • After the initial boot of an unconfigured switch, all ports are members of the default VLAN. 

  • An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.

  • Voice VLANs are used to support user phone and e-mail traffic on a network.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?