CCNA 2 MOD 10-13

CCNA 2 MOD 10-13

Professional Development

80 Qs

quiz-placeholder

Similar activities

Hydraulics Final

Hydraulics Final

Professional Development

85 Qs

GPM Exam 1 Review (part 2)

GPM Exam 1 Review (part 2)

Professional Development

75 Qs

LCC Exam Review

LCC Exam Review

Professional Development

79 Qs

C_TS412_1909 - SAP Certified Application Associate - SAP S4HANA

C_TS412_1909 - SAP Certified Application Associate - SAP S4HANA

Professional Development

80 Qs

DP-900_Simulado_02

DP-900_Simulado_02

Professional Development

77 Qs

Компьютерные сети

Компьютерные сети

Professional Development

75 Qs

Interview and Investigation Final Exam Review

Interview and Investigation Final Exam Review

Professional Development

77 Qs

PSM I Practice Exam - 80 questions

PSM I Practice Exam - 80 questions

Professional Development

80 Qs

CCNA 2 MOD 10-13

CCNA 2 MOD 10-13

Assessment

Quiz

Professional Development

Professional Development

Practice Problem

Hard

Created by

Pop 🤍

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

ARP spoofing

DHCP starvation

IP address spoofing

MAC address flooding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Disable DTP

Disable STP

Enable port security

place unused ports in an unused VLAN

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

3. Which three Cisco products focus on endpoint security solutions? (Choose three.)

ISP Sensor Appliance

Web Security Appliance

Email Security Appliance

SSL/IPsec VPN Appliance

NAC Appliance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. True or False?
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

true

false

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which authentication method stores usernames and passwords in the router and is ideal for small networks?

  • server-based AAA over TACACS+

  • local AAA over RADIUS

  • server-based AAA

  • local AAA over TACACS+

local AAA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

  • Enable CDP on edge devices, and enable LLDP on interior devices.

  • Use the open standard LLDP rather than CDP.

  • Use the default router settings for CDP and LLDP.

Disable both protocols on all interfaces where they are not required.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

  • SNMP

  • TFTP

SSH

SCP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?