SRWE Q1

SRWE Q1

KG

40 Qs

quiz-placeholder

Similar activities

EtherChannel and HSRP Quiz

EtherChannel and HSRP Quiz

University

35 Qs

ULANGAN HARIAN AIJ XI TKJ 2020/2021

ULANGAN HARIAN AIJ XI TKJ 2020/2021

11th Grade

40 Qs

Networking Quiz

Networking Quiz

University

40 Qs

secondary ccna quiz

secondary ccna quiz

10th Grade

35 Qs

TIK KELAS 9

TIK KELAS 9

KG

40 Qs

SRWE Q2

SRWE Q2

1st - 5th Grade

42 Qs

ADMINISTRASI INFRASTRUKTUR JARINGAN XI TKJ 2020

ADMINISTRASI INFRASTRUKTUR JARINGAN XI TKJ 2020

1st - 10th Grade

40 Qs

Test 3 - CCNA 2

Test 3 - CCNA 2

Professional Development

45 Qs

SRWE Q1

SRWE Q1

Assessment

Quiz

Other

KG

Medium

Created by

Scott Goodenough

Used 80+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is a secure configuration option for remote access to a network device?

Configure SSH.

Configure 802.1x.

Configure an ACL and apply it to the VTY lines.

Configure Telnet.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?

The host checks the local neighbor cache for the learned address and if the address is not cached, it it considered unique.

The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique.

The host sends an ICMPv6 echo request message to the DHCPv6 or SLAAC-learned address and if no reply is returned, the address is considered unique.

The host sends an ARP broadcast to the local link and if no hosts send a reply, the address is considered unique.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?

standalone wireless access point

firewall appliance

switch

wireless router

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which wireless encryption method is the most secure?

WPA2 with AES

WPA2 with TKIP

WEP

WPA

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

What are three techniques for mitigating VLAN attacks? (Choose three.)

Enable BPDU guard.

Set the native VLAN to an unused VLAN.

Use private VLANs.

Disable DTP.

Enable trunking manually.

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

An administrator is trying to remove configurations from a switch. After using the command erase startup-config and reloading the switch, the administrator finds that VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed?

These VLANs cannot be deleted unless the switch is in VTP client mode.

These VLANs can only be removed from the switch by using the no vlan 10 and no vlan 100 commands.

These VLANs are default VLANs that cannot be removed.

Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A network administrator is configuring a WLAN. Why would the administrator disable the broadcast feature for the SSID?

to reduce the risk of interference by external devices such as microwave ovens

to reduce the risk of unauthorized APs being added to the network

to provide privacy and integrity to wireless traffic by using encryption

to eliminate outsiders scanning for available SSIDs in the area

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?