Modules 10-13: L2 Security and WLANs

Modules 10-13: L2 Security and WLANs

12th Grade

80 Qs

quiz-placeholder

Similar activities

Latihan Ujian Produktif TKJ Teknik Komputer dan jaringan

Latihan Ujian Produktif TKJ Teknik Komputer dan jaringan

10th - 12th Grade

80 Qs

1101 M5 Review

1101 M5 Review

9th Grade - Professional Development

77 Qs

NET+ Quiz Part 26

NET+ Quiz Part 26

12th Grade

80 Qs

simulasi 2

simulasi 2

1st - 12th Grade

75 Qs

WAN

WAN

10th - 12th Grade

80 Qs

network

network

12th Grade

78 Qs

CompTIA A+

CompTIA A+

11th Grade - University

80 Qs

Ulangan KJD GENAP 2020

Ulangan KJD GENAP 2020

4th - 12th Grade

79 Qs

Modules 10-13: L2 Security and WLANs

Modules 10-13: L2 Security and WLANs

Assessment

Quiz

Computers

12th Grade

Easy

Cisco

Standards-aligned

Created by

Benjamin House

Used 4+ times

FREE Resource

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

Arp spoofing

DHCP starvation

IP address spoofing

Mac address Flooding

Answer explanation

Explanation: The DHCP starvation attack causes the exhaustion of the IP address pool of a DHCP server before legitimate users can obtain valid IP addresses.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Disable Dtp

Disable STP

Enable port security

Place unused ports in an unused VLAN

Answer explanation

Explanation: A MAC address (CAM) table overflow attack, buffer overflow, and MAC address spoofing can all be mitigated by configuring port security. A network administrator would typically not want to disable STP because it prevents Layer 2 loops. DTP is disabled to prevent VLAN hopping. Placing unused ports in an unused VLAN prevents unauthorized wired connectivity.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

3. Which three Cisco products focus on endpoint security solutions? (Choose three.)

IPs sensor Appliance

Web Security Appliance

Email Security Appliance

Adaptive Security Appliance

NAC Appliance

Answer explanation

Explanation: The primary components of endpoint security solutions are Cisco Email and Web Security appliances, and Cisco NAC appliance. ASA, SSL/IPsec VPN, and IPS sensor appliances all provide security solutions that focus on the enterprise network, not on endpoint devices.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True Or false?

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. Which authentication method stores usernames and passwords in the router and is ideal for small networks?

Server-based AAA over TACACS+

local AAA over RAIDUS

server-based AAA

Local AAA

local AAA over TACS+

Answer explanation

Explanation: In a small network with a few network devices, AAA authentication can be implemented with the local database and with usernames and passwords stored on the network devices. Authentication using the TACACS+ or RADIUS protocol will require dedicated ACS servers although this authentication solution scales well in a large network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Enable CDP on edge devices, and enable LLDP on interior devices

Use the open standard LLDP rather than CDP

Use the default router settings for CDP and LLDP

Disable both protocols on all interfaces where they are not required

Answer explanation

Explanation: Both discovery protocols can provide hackers with sensitive network information. They should not be enabled on edge devices, and should be disabled globally or on a per-interface basis if not required. CDP is enabled by default.​

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

SNMP

TFTP

SSH

SCP

Answer explanation

Explanation: Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?