Semi-Final Exam

Semi-Final Exam

University

40 Qs

quiz-placeholder

Similar activities

HECATMA Final Quiz

HECATMA Final Quiz

University

45 Qs

creative imedia

creative imedia

11th Grade - Professional Development

40 Qs

Ekonomi Mikro 2

Ekonomi Mikro 2

1st Grade - University

40 Qs

Psychological Testing

Psychological Testing

University

37 Qs

ACEE 1 Midterm Exam

ACEE 1 Midterm Exam

University

40 Qs

RBT T2 BAB 2.4 REKA BENTUK ELEKTRONIK (SET 2@ 2.4.3-2.4.6)

RBT T2 BAB 2.4 REKA BENTUK ELEKTRONIK (SET 2@ 2.4.3-2.4.6)

University

44 Qs

Intercultural Communication A

Intercultural Communication A

University

45 Qs

TEST - FOUNDATIONS OF EDUCATION (EDUC 212)

TEST - FOUNDATIONS OF EDUCATION (EDUC 212)

University

45 Qs

Semi-Final Exam

Semi-Final Exam

Assessment

Quiz

Other

University

Hard

Created by

Alma Alid-ab

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Layer 2 attack will result in a switch flooding incoming frames to all ports?

MAC address overflow

Spanning Tree Protocol manipulation

IP address spoofing

ARP poisoning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

HTTP

LLDP

CDP

FTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is authentication with AAA preferred over a local database method?

It specifies a different password for each line or port.

It requires a login and password combination on the console, vty lines, and aux ports.

It provides a fallback authentication method if the administrator forgets the username or password.

It uses less network bandwidth.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server?

SSH

802.1x

RADIUS

TACACS

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which Cisco solution helps prevent MAC and IP address spoofing attacks?

Dynamic ARP Inspection

IP Source Guard

Port Security

DHCP Snooping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

false

true

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Enable port security

Disable DTP

Disable STP

Place unused ports in an unused VLAN

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?