105 10-13 Review

105 10-13 Review

10th Grade - Professional Development

38 Qs

quiz-placeholder

Similar activities

Komunikasi Nirkabel Pita Lebar

Komunikasi Nirkabel Pita Lebar

12th Grade

35 Qs

một số dịch vụ cơ bản của internet

một số dịch vụ cơ bản của internet

12th Grade

36 Qs

Topic 1 Introduction to Computer System

Topic 1 Introduction to Computer System

University

40 Qs

TEKNIK KOMPUTER & JARINGAN X

TEKNIK KOMPUTER & JARINGAN X

10th Grade

40 Qs

SOAL ULANGAN 2 : HARDWARE KOMPUTER

SOAL ULANGAN 2 : HARDWARE KOMPUTER

10th Grade

40 Qs

Computer Knowledge

Computer Knowledge

1st - 10th Grade

33 Qs

ASJ TKJ Debian 8.0

ASJ TKJ Debian 8.0

11th Grade

40 Qs

City and Guilds Award in Cloud Services

City and Guilds Award in Cloud Services

12th Grade

40 Qs

105 10-13 Review

105 10-13 Review

Assessment

Quiz

Computers

10th Grade - Professional Development

Medium

Created by

Pasquale Crea

Used 5+ times

FREE Resource

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

(Module 10)

When security is a concern, which OSI Layer is considered to be the weakest link in a network system?​

Layer 2

Layer 3

Layer 4

Layer 7

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Layer 2 attack will result in a switch flooding incoming frames to all ports?

ARP Poisoning

Spanning Tree Protocol Manipulation

MAC address overflow

IP address spoofing

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server?

RADIUS

SSH

802.1x

TACACS

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Cisco solution helps prevent MAC and IP address spoofing attacks?

DHCP Snooping

Dynamic ARP Inspection

IP Source Gaurd

Port Security

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of AAA accounting?

to collect and report application usage

to determine which resources the user can access

to prove users are who they say they are

to determine which operations the user can perform

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

DHCP starvation

IP address spoofing

MAC address flooding

ARP spoofing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is involved in an IP address spoofing attack?

Bogus DHCPDISCOVER messages are sent to consume all the available IP addresses on a DHCP server.

A rogue node replies to an ARP request with its own MAC address indicated for the target IP address.

A legitimate network IP address is hijacked by a rogue node.

A rogue DHCP server provides false IP configuration parameters to legitimate DHCP clients.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?