
Cisco_Sem2_Mod11
Authored by Alexander Alves
Computers
1st - 5th Grade
Used 27+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
One million Americans spend an average of 17 days a year doing this?
Surfing
Swimming
Fishing
Sailing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False, A simple method that many administrators use to help secure the network from unauthorized access is to enable all unused ports on a switch
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False, The simplest and most effective method to prevent MAC address table overflow attacks is to disable port security
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False, Port security is enabled with the switchport port-security interface configuration command
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False, If an active port is configured with the switchport port-security command and more than one device is connected to that port, the port will transition to the error-disabled state
True
False
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
The switch can be configured to learn about MAC addresses on a secure port in one of three ways, select ALL three
Manually Configured
Dynamically Learned
Dynamically Learned – Sticky
Dynamically Configured
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False, when introducing a rogue switch and enabling trunking. An attacker can then access all the VLANs on the victim switch from the rogue switch
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?