Test 7 - CCNA 2

Test 7 - CCNA 2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Training Network Operation

Training Network Operation

Professional Development

15 Qs

Quiz Lunes

Quiz Lunes

Professional Development

15 Qs

NetworkQuiz-1

NetworkQuiz-1

Professional Development

20 Qs

FAMILY MUSTAFFA ROBIAH GAMES 1

FAMILY MUSTAFFA ROBIAH GAMES 1

7th Grade - Professional Development

10 Qs

Computer Networks

Computer Networks

Professional Development

20 Qs

Test 2 - CCNA 2

Test 2 - CCNA 2

Professional Development

15 Qs

Redes_OT

Redes_OT

1st Grade - Professional Development

20 Qs

Test 5 - CCNA 2

Test 5 - CCNA 2

Professional Development

10 Qs

Test 7 - CCNA 2

Test 7 - CCNA 2

Assessment

Quiz

Other

Professional Development

Hard

Created by

Mihaela Rînja

Used 12+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended best practice when dealing with the native VLAN?

Use port security.

Turn off DTP.

Assign it to an unused VLAN.

Assign the same VLAN number as the management VLAN.

Answer explanation

Explanation: Port security cannot be enabled on a trunk and trunks are the only types of ports that have a native VLAN. Even though turning DTP off on a trunk is a best practice, it does not have anything to do with native VLAN risks. To prevent security breaches that take advantage of the native VLAN, place the native VLAN in an unused VLAN other than VLAN 1. The management VLAN should also be an unused VLAN that is different from the native VLAN and something other than VLAN 1.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to prevent a VLAN hopping attack?

Use ISL encapsulation on all trunk links.

Disable STP on all nontrunk ports.

Use VLAN 1 as the native VLAN on trunk ports.

Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.

Answer explanation

Explanation: VLAN hopping attacks rely on the attacker being able to create a trunk link with a switch. Disabling DTP and configuring user-facing ports as static access ports can help prevent these types of attacks. Disabling the Spanning Tree Protocol (STP) will not eliminate VLAN hopping attacks.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two commands can be used to enable PortFast on a switch? (Choose two.)

S1(config-if)# enable spanning-tree portfast

S1(config-if)# spanning-tree portfast

S1(config)# enable spanning-tree portfast default

S1(config)# spanning-tree portfast default

S1(config-line)# spanning-tree portfast

Answer explanation

Explanation: PortFast can be configured on all nontrunking ports using the spanning-tree portfast default global configuration command. Alternatively, PortFast can be enabled on an interface using the spanning-tree portfast interface configuration command.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A network administrator is configuring DHCP snooping on a switch. Which configuration command should be used first?

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A network administrator is configuring DAI on a switch. Which command should be used on the uplink interface that connects to a router?

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command?

Answer explanation

Explanation: When MAC addresses are automatically learned by using the sticky command option, the learned MAC addresses are added to the running configuration, which is stored in RAM.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?