Module 10 Post - Assessment
Quiz
•
Computers
•
11th Grade
•
Practice Problem
•
Medium
Alicia Pierce
Used 35+ times
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication method stores usernames and passwords in the router and is ideal for small networks?
local AAA
local AAA over RADIUS
local AAA over TACACS+
server-based AAA
server-based AAA over RADIUS
Answer explanation
In a small network with a few network devices, AAA authentication can be implemented with the local database and with usernames and passwords stored on the network devices. Authentication using the TACACS+ or RADIUS protocol will require dedicated ACS servers although this authentication solution scales well in a large network.
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)
NTP
TACACS+
SSH
HTTPS
RADIUS
Answer explanation
By using TACACS+ or RADIUS, AAA can authenticate users from a database of usernames and passwords stored centrally on a server such as a Cisco ACS server.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the result of a DHCP starvation attack?
Legitimate clients are unable to lease IP addresses.
Clients receive IP address assignments from a rogue DHCP server.
The attacker provides incorrect DNS and default gateway information to clients.
The IP addresses assigned to legitimate clients are hijacked.
Answer explanation
DCHP starvation attacks are launched by an attacker with the intent to create a DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER messages to lease the entire pool of available IP addresses, thus denying them to legitimate hosts.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?
Use the open standard LLDP rather than CDP.
Disable both protocols on all interfaces where they are not required.
Use the default router settings for CDP and LLDP.
Enable CDP on edge devices, and enable LLDP on interior devices.
Answer explanation
Both discovery protocols can provide hackers with sensitive network information. They should not be enabled on edge devices, and should be disabled globally or on a per-interface basis if not required. CDP is enabled by default.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?
SCP
SSH
TFTP
SNMP
Answer explanation
Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes the behavior of a switch when the MAC address table is full?
It treats frames as unknown unicast and floods all incoming frames to all ports on the switch.
It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.
It treats frames as unknown unicast and floods all incoming frames to all ports within the collision domain.
It treats frames as unknown unicast and floods all incoming frames to all ports across multiple switches.
Answer explanation
When the MAC address table is full, the switch treats the frame as an unknown unicast and begins to flood all incoming traffic to all ports only within the local VLAN.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which feature on a switch makes it vulnerable to VLAN hopping attacks?
the mixed duplex mode enabled for all ports by default
the limited size of content-addressable memory space
mixed port bandwidth support enabled for all ports by default
the automatic trunking port feature enabled for all ports by default
Answer explanation
A VLAN hopping attack enables traffic from one VLAN to be seen by another VLAN without routing. In a basic VLAN hopping attack, the attacker takes advantage of the automatic trunking port feature enabled by default on most switch ports.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Primary storage
Quiz
•
9th - 11th Grade
20 questions
Higher SDD Revision
Quiz
•
11th - 12th Grade
20 questions
UH - 01 VII
Quiz
•
1st - 12th Grade
20 questions
Storage and Memory Gr 11
Quiz
•
11th Grade
20 questions
PILIHAN GANDA INFORMATIKA
Quiz
•
11th Grade
20 questions
MTA - Microsoft Operating Systems Review 1
Quiz
•
10th Grade - Professi...
20 questions
Yr 11 ICT quiz 1 Networks & Security
Quiz
•
10th - 11th Grade
20 questions
Word 2016 - Lessons 1 & 2
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
20 questions
christmas songs
Quiz
•
KG - University
