Search Header Logo

CCNA - SRWE - 10.3.4

Authored by Edwin Salazar

Instructional Technology

University

CCNA - SRWE - 10.3.4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following mitigation techniques are used to protect Layer 3 through Layer 7 of the OSI Model? (Choose three.)

DHCP snooping

VPN

Firewalls

IPSG

IPS devices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following mitigation techniques prevents many types of attacks including MAC address table overflow and DHCP starvation attacks?

IPSG

DHCP snooping

DAI

Port security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following mitigation techniques prevents MAC and IP address spoofing?

IPSG

DHCP snooping

DAI

Port security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following mitigation techniques prevents ARP spoofing and ARP poisoning attacks?

IPSG

DHCP snooping

DAI

Port security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following mitigation techniques prevents DHCP starvation and DHCP spoofing attacks?

IPSG

DHCP snooping

DAI

Port security

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?