Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

CCNAv2 mod 10-13 EXAM PRERP

Quiz
•
Computers
•
9th - 12th Grade
•
Hard

Snoop Teniten
Used 1+ times
FREE Resource
84 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
ARP spoofing
IP address spoofing
DHCP starvation
MAC address flooding
Answer explanation
Explanation: The DHCP starvation attack causes the exhaustion of the IP address pool of a DHCP server before legitimate users can obtain valid IP addresses.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?
Disable DTP.
Disable STP.
Enable port security.
Place unused ports in an unused VLAN.
Answer explanation
Explanation: A MAC address (CAM) table overflow attack, buffer overflow, and MAC address spoofing can all be mitigated by configuring port security. A network administrator would typically not want to disable STP because it prevents Layer 2 loops. DTP is disabled to prevent VLAN hopping. Placing unused ports in an unused VLAN prevents unauthorized wired connectivity.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three Cisco products focus on endpoint security solutions? (Choose three.)
Web Security Appliance
Email Security Appliance
SSL/IPsec VPN Appliance
Adaptive Security Appliance
NAC Appliance
Answer explanation
Explanation: The primary components of endpoint security solutions are Cisco Email and Web Security appliances, and Cisco NAC appliance. ASA, SSL/IPsec VPN, and IPS sensor appliances all provide security solutions that focus on the enterprise network, not on endpoint devices.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
true
false
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication method stores usernames and passwords in the router and is ideal for small networks?
local AAA over RADIUS
server-based AAA
local AAA over TACACS+
local AAA
server-based AAA over RADIUS
Answer explanation
Explanation: In a small network with a few network devices, AAA authentication can be implemented with the local database and with usernames and passwords stored on the network devices. Authentication using the TACACS+ or RADIUS protocol will require dedicated ACS servers although this authentication solution scales well in a large network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?
Enable CDP on edge devices, and enable LLDP on interior devices.
Use the open standard LLDP rather than CDP.
Use the default router settings for CDP and LLDP.
Disable both protocols on all interfaces where they are not required.
Answer explanation
Explanation: Both discovery protocols can provide hackers with sensitive network information. They should not be enabled on edge devices, and should be disabled globally or on a per-interface basis if not required. CDP is enabled by default.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?
SNMP
TFTP
SSH
SCP
Answer explanation
Explanation: Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.
Create a free account and access millions of resources
Similar Resources on Quizizz
88 questions
Unit 1.1 How IT can be used to fulfil the needs of organisations

Quiz
•
11th Grade
81 questions
GCSE Computer Science Year 10 Spiral 1 Revision

Quiz
•
9th - 10th Grade
84 questions
Network Switch Quiz

Quiz
•
12th Grade
88 questions
Jaringan Komputer dan Internet

Quiz
•
11th Grade
80 questions
NET+ Quiz Part 26

Quiz
•
12th Grade
80 questions
Modules 10-13: L2 Security and WLANs

Quiz
•
12th Grade
87 questions
It essentials chapters 1-14

Quiz
•
9th Grade - University
86 questions
OCR J277 Computer Science Paper 1 Revision Test 1

Quiz
•
11th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University