CCNA 2 MOD 10-13

CCNA 2 MOD 10-13

Professional Development

80 Qs

quiz-placeholder

Similar activities

Quizzical Who know what number now!

Quizzical Who know what number now!

Professional Development

85 Qs

Orange packet Ch. 8 & 9

Orange packet Ch. 8 & 9

Professional Development

76 Qs

กยก.รุ่นที่86

กยก.รุ่นที่86

Professional Development

80 Qs

Post Test Public Basic Materi (6 Jam)

Post Test Public Basic Materi (6 Jam)

Professional Development

80 Qs

IDA-201 Final

IDA-201 Final

Professional Development

75 Qs

electrical engg 2

electrical engg 2

Professional Development

75 Qs

Medical Knowledge Quiz

Medical Knowledge Quiz

Professional Development

84 Qs

Sınaq 3

Sınaq 3

Professional Development

80 Qs

CCNA 2 MOD 10-13

CCNA 2 MOD 10-13

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Pop 🤍

FREE Resource

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

ARP spoofing

DHCP starvation

IP address spoofing

MAC address flooding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Disable DTP

Disable STP

Enable port security

place unused ports in an unused VLAN

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

3. Which three Cisco products focus on endpoint security solutions? (Choose three.)

ISP Sensor Appliance

Web Security Appliance

Email Security Appliance

SSL/IPsec VPN Appliance

NAC Appliance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. True or False?
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

true

false

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which authentication method stores usernames and passwords in the router and is ideal for small networks?

  • server-based AAA over TACACS+

  • local AAA over RADIUS

  • server-based AAA

  • local AAA over TACACS+

local AAA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

  • Enable CDP on edge devices, and enable LLDP on interior devices.

  • Use the open standard LLDP rather than CDP.

  • Use the default router settings for CDP and LLDP.

Disable both protocols on all interfaces where they are not required.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

  • SNMP

  • TFTP

SSH

SCP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Professional Development