Module 10 Post - Assessment

Module 10 Post - Assessment

11th Grade

25 Qs

quiz-placeholder

Similar activities

HISTORY OF COMPUTER_SUMMATIVE 1

HISTORY OF COMPUTER_SUMMATIVE 1

11th - 12th Grade

20 Qs

CCEA Digital Technology Chapter 14 Multimedia Applications

CCEA Digital Technology Chapter 14 Multimedia Applications

11th Grade

20 Qs

KUIZ TMK TAHUN 4 2018 (MODUL 1/UNIT 2)

KUIZ TMK TAHUN 4 2018 (MODUL 1/UNIT 2)

10th - 12th Grade

20 Qs

PH 2 Jaringan Komputer

PH 2 Jaringan Komputer

9th - 12th Grade

20 Qs

ENTITI, ATRIBUT , Pangkalan data

ENTITI, ATRIBUT , Pangkalan data

1st - 12th Grade

21 Qs

Quiz sobre el Código de la discordia

Quiz sobre el Código de la discordia

11th Grade

20 Qs

Google

Google

7th - 12th Grade

20 Qs

Logika & Pemrograman (ID)

Logika & Pemrograman (ID)

10th Grade - Professional Development

20 Qs

Module 10 Post - Assessment

Module 10 Post - Assessment

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Alicia Pierce

Used 43+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

local AAA

local AAA over RADIUS

local AAA over TACACS+

server-based AAA

server-based AAA over RADIUS

Answer explanation

In a small network with a few network devices, AAA authentication can be implemented with the local database and with usernames and passwords stored on the network devices. Authentication using the TACACS+ or RADIUS protocol will require dedicated ACS servers although this authentication solution scales well in a large network.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)

NTP

TACACS+

SSH

HTTPS

RADIUS

Answer explanation

By using TACACS+ or RADIUS, AAA can authenticate users from a database of usernames and passwords stored centrally on a server such as a Cisco ACS server.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the result of a DHCP starvation attack?

Legitimate clients are unable to lease IP addresses.

Clients receive IP address assignments from a rogue DHCP server.

The attacker provides incorrect DNS and default gateway information to clients.

The IP addresses assigned to legitimate clients are hijacked.

Answer explanation

DCHP starvation attacks are launched by an attacker with the intent to create a DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER messages to lease the entire pool of available IP addresses, thus denying them to legitimate hosts.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Use the open standard LLDP rather than CDP.

Disable both protocols on all interfaces where they are not required.

Use the default router settings for CDP and LLDP.

Enable CDP on edge devices, and enable LLDP on interior devices.

Answer explanation

Both discovery protocols can provide hackers with sensitive network information. They should not be enabled on edge devices, and should be disabled globally or on a per-interface basis if not required. CDP is enabled by default.​

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

SCP

SSH

TFTP

SNMP

Answer explanation

Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the behavior of a switch when the MAC address table is full?

It treats frames as unknown unicast and floods all incoming frames to all ports on the switch.

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.

It treats frames as unknown unicast and floods all incoming frames to all ports within the collision domain.

It treats frames as unknown unicast and floods all incoming frames to all ports across multiple switches.

Answer explanation

When the MAC address table is full, the switch treats the frame as an unknown unicast and begins to flood all incoming traffic to all ports only within the local VLAN.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature on a switch makes it vulnerable to VLAN hopping attacks?

the mixed duplex mode enabled for all ports by default

the limited size of content-addressable memory space

mixed port bandwidth support enabled for all ports by default

the automatic trunking port feature enabled for all ports by default

Answer explanation

A VLAN hopping attack enables traffic from one VLAN to be seen by another VLAN without routing. In a basic VLAN hopping attack, the attacker takes advantage of the automatic trunking port feature enabled by default on most switch ports.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?