Modules 10-13: L2 Security and WLANs
Quiz
•
Computers
•
12th Grade
•
Practice Problem
•
Easy
Standards-aligned
Benjamin House
Used 4+ times
FREE Resource
Enhance your content in a minute
80 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. Which Layer 2 attack will result in legitimate users not getting valid IP addresses?
Arp spoofing
DHCP starvation
IP address spoofing
Mac address Flooding
Answer explanation
Explanation: The DHCP starvation attack causes the exhaustion of the IP address pool of a DHCP server before legitimate users can obtain valid IP addresses.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
2. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?
Disable Dtp
Disable STP
Enable port security
Place unused ports in an unused VLAN
Answer explanation
Explanation: A MAC address (CAM) table overflow attack, buffer overflow, and MAC address spoofing can all be mitigated by configuring port security. A network administrator would typically not want to disable STP because it prevents Layer 2 loops. DTP is disabled to prevent VLAN hopping. Placing unused ports in an unused VLAN prevents unauthorized wired connectivity.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
3. Which three Cisco products focus on endpoint security solutions? (Choose three.)
IPs sensor Appliance
Web Security Appliance
Email Security Appliance
Adaptive Security Appliance
NAC Appliance
Answer explanation
Explanation: The primary components of endpoint security solutions are Cisco Email and Web Security appliances, and Cisco NAC appliance. ASA, SSL/IPsec VPN, and IPS sensor appliances all provide security solutions that focus on the enterprise network, not on endpoint devices.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True Or false?
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
5. Which authentication method stores usernames and passwords in the router and is ideal for small networks?
Server-based AAA over TACACS+
local AAA over RAIDUS
server-based AAA
Local AAA
local AAA over TACS+
Answer explanation
Explanation: In a small network with a few network devices, AAA authentication can be implemented with the local database and with usernames and passwords stored on the network devices. Authentication using the TACACS+ or RADIUS protocol will require dedicated ACS servers although this authentication solution scales well in a large network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
6. What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?
Enable CDP on edge devices, and enable LLDP on interior devices
Use the open standard LLDP rather than CDP
Use the default router settings for CDP and LLDP
Disable both protocols on all interfaces where they are not required
Answer explanation
Explanation: Both discovery protocols can provide hackers with sensitive network information. They should not be enabled on edge devices, and should be disabled globally or on a per-interface basis if not required. CDP is enabled by default.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
7. Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?
SNMP
TFTP
SSH
SCP
Answer explanation
Explanation: Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
75 questions
Computer Test
Quiz
•
12th Grade
75 questions
Y11 Architecture & Primary Homework
Quiz
•
12th Grade
76 questions
Systemy operacyjne 2
Quiz
•
12th Grade
80 questions
Chapter 18 - 21 Video Game Programming
Quiz
•
9th - 12th Grade
83 questions
BLUE PRISM_SET-1
Quiz
•
12th Grade
80 questions
INTERFEST
Quiz
•
12th Grade
83 questions
Compilation Stages Vocabulary
Quiz
•
12th Grade
79 questions
H446_4_DB_Compression Quiz
Quiz
•
12th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
Discover more resources for Computers
15 questions
Internet Vocabulary Notebook Check #2 - CTEA(2024)
Quiz
•
12th Grade
11 questions
Internet Terms Vocabulary- Notebook Check #1- CTEA
Quiz
•
12th Grade
50 questions
Money Matters Fall 2025 Final Exam — Worksheet Questions
Quiz
•
12th Grade
47 questions
CSF Final Exam Practice
Quiz
•
9th - 12th Grade
