SRWE Q1

SRWE Q1

KG

40 Qs

quiz-placeholder

Similar activities

QUIZZ AIJ - VLAN

QUIZZ AIJ - VLAN

KG - Professional Development

35 Qs

Pre-Test

Pre-Test

1st - 3rd Grade

35 Qs

Networking Quiz

Networking Quiz

University

40 Qs

VLANs and Networking Concepts

VLANs and Networking Concepts

University

40 Qs

UAS AIJ XI TKJ 2021/2022

UAS AIJ XI TKJ 2021/2022

11th Grade

40 Qs

CCNA Post Test-Cisco

CCNA Post Test-Cisco

Professional Development

35 Qs

U. ADMINSTRASI INFRASTURUKTUR JARINGAN

U. ADMINSTRASI INFRASTURUKTUR JARINGAN

11th Grade

40 Qs

UAS ADMINISTRASI INFRASTRUKTUR JARINGAN KELAS XI

UAS ADMINISTRASI INFRASTRUKTUR JARINGAN KELAS XI

11th Grade

40 Qs

SRWE Q1

SRWE Q1

Assessment

Quiz

Other

KG

Medium

Created by

Scott Goodenough

Used 80+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is a secure configuration option for remote access to a network device?

Configure SSH.

Configure 802.1x.

Configure an ACL and apply it to the VTY lines.

Configure Telnet.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?

The host checks the local neighbor cache for the learned address and if the address is not cached, it it considered unique.

The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.

The host sends an ICMPv6 echo request message to the DHCPv6 or SLAAC-learned address and if no reply is returned, the address is considered unique.

The host sends an ARP broadcast to the local link and if no hosts send a reply, the address is considered unique.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?

standalone wireless access point

firewall appliance

switch

wireless router

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which wireless encryption method is the most secure?

WPA2 with AES

WPA2 with TKIP

WEP

WPA

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

What are three techniques for mitigating VLAN attacks? (Choose three.)

Enable BPDU guard.

Set the native VLAN to an unused VLAN.

Use private VLANs.

Disable DTP.

Enable trunking manually.

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

An administrator is trying to remove configurations from a switch. After using the command erase startup-config and reloading the switch, the administrator finds that VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed?

These VLANs cannot be deleted unless the switch is in VTP client mode.

These VLANs can only be removed from the switch by using the no vlan 10 and no vlan 100 commands.

These VLANs are default VLANs that cannot be removed.

Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A network administrator is configuring a WLAN. Why would the administrator disable the broadcast feature for the SSID?

to reduce the risk of interference by external devices such as microwave ovens

to reduce the risk of unauthorized APs being added to the network

to provide privacy and integrity to wireless traffic by using encryption

to eliminate outsiders scanning for available SSIDs in the area

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Other