networking mod 11-13

networking mod 11-13

University

70 Qs

quiz-placeholder

Similar activities

Networking and Telecommunication

Networking and Telecommunication

10th Grade - University

74 Qs

CCNA 1 (v.6) Final Exam Study Guide

CCNA 1 (v.6) Final Exam Study Guide

University

70 Qs

CCNA1

CCNA1

University

74 Qs

Questions

Questions

University

66 Qs

CNA

CNA

University

65 Qs

IT Skills and Concepts Quiz

IT Skills and Concepts Quiz

10th Grade - University

75 Qs

networking mod 11-13

networking mod 11-13

Assessment

Quiz

Computers

University

Easy

Created by

Minase Aoi

Used 8+ times

FREE Resource

70 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

hich three Cisco products focus on endpoint security solutions? (Choose three.)

  • NAC Appliance

  • Web Security Appliance

  • Email Security Appliance

  • SSL/IPsec VPN Appliance

  • Adaptive Security Appliance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

  • Enable port security.

  • Place unused ports in an unused VLAN.

  • Disable DTP.

  • Disable STP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  • True or False?
    In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

  • true

  • false

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method stores usernames and passwords in the router and is ideal for small networks?


  • server-based AAA over RADIUS

  • local AAA

  • local AAA over TACACS+

  • server-based AAA

  • local AAA over RADIUS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

  • Disable both protocols on all interfaces where they are not required.

  • Use the default router settings for CDP and LLDP.

  • Use the open standard LLDP rather than CDP.

  • Enable CDP on edge devices, and enable LLDP on interior devices.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

  • SCP

  • SSH

  • TFTP

  • SNMP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the behavior of a switch when the MAC address table is full?

  • It treats frames as unknown unicast and floods all incoming frames to all ports within the collision domain.

  • It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.

  • It treats frames as unknown unicast and floods all incoming frames to all ports across multiple switches.

  • It treats frames as unknown unicast and floods all incoming frames to all ports on the switch.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?