
Chapter 5: Network Security and Monitoring
Authored by Moi Rigor
Professional Development, Computers, Other
University - Professional Development
Used 13+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which among these is not a common LAN attack?
MAC Address Table Flooding Attack
VLAN Attack
Network Attack
Telnet Attack
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What does SNMP stand for?
Simple Network Managing Protocol
Samahan ng Malalaking Puso
Samahan ng Malalamig ang Pasko
Simple Network Management Protocol
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is not an element of SNMP system?
SNMP agents
SNMP workers
SNMP managers
Management Information Base (MIB)
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?
TACACS+
SSH
RADIUS
MD5
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?
DHCP starvation
IP address spoofing
DHCP spoofing
CAM table attack
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?
TACACS+
RADIUS
SSH
802.1x
7.
MULTIPLE SELECT QUESTION
10 sec • 1 pt
Which protocol is used to provide server-based AAA authentication? (CHOOSE TWO)
SNMP
RADIUS
SSH
802.1x
TACACS+
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?