Gab Reviewer Mwah

Gab Reviewer Mwah

70 Qs

quiz-placeholder

Similar activities

Introduction to Latitude and Longitude

Introduction to Latitude and Longitude

12th Grade - University

65 Qs

Kindergarden quiz

Kindergarden quiz

KG

70 Qs

Section 4 Operations Management AS Level Chap 23-25 Quiz

Section 4 Operations Management AS Level Chap 23-25 Quiz

KG - University

75 Qs

English III Exam 2 Practice

English III Exam 2 Practice

9th - 12th Grade

72 Qs

Unit 4 exam

Unit 4 exam

KG - University

75 Qs

Reflexive Verbs Quiz Practice

Reflexive Verbs Quiz Practice

9th - 12th Grade

75 Qs

2nd Semester CCR Final ACP

2nd Semester CCR Final ACP

KG - University

70 Qs

Gab Reviewer Mwah

Gab Reviewer Mwah

Assessment

Quiz

others

Medium

Created by

GABRIELL TERRENAL

Used 2+ times

FREE Resource

70 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?
ARP spoofing
DHCP starvation
IP address spoofing
MAC address flooding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?
Disable DTP.
Disable STP.
Enable port security.
Place unused ports in an unused VLAN.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

T or F. In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
True
False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method stores usernames and passwords in the router and is ideal for small networks?
local AAA
server-based AAA over TACACS+
local AAA over RADIUS
server-based AAA
local AAA over TACACS+

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?
Enable CDP on edge devices, and enable LLDP on interior devices.
Use the open standard LLDP rather than CDP.
Use the default router settings for CDP and LLDP.
Disable both protocols on all interfaces where they are not required.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?
SNMP
TFTP
SSH
SCP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the behavior of a switch when the MAC address table is full?
It treats frames as unknown unicast and floods all incoming frames to all ports on the switch.
It treats frames as unknown unicast and floods all incoming frames to all ports across multiple switches.
It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.
It treats frames as unknown unicast and floods all incoming frames to all ports within the collision domain.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?