Semi-Final Exam

Semi-Final Exam

University

40 Qs

quiz-placeholder

Similar activities

Networking Ch 1-3

Networking Ch 1-3

University

35 Qs

2021 | ITNW1413 | NW4C | Midterm Examination

2021 | ITNW1413 | NW4C | Midterm Examination

University

35 Qs

SOAL PTS TJKN

SOAL PTS TJKN

11th Grade - University

40 Qs

BTVI - 2204 Cohort 4 - Midterm Exam

BTVI - 2204 Cohort 4 - Midterm Exam

University

45 Qs

Ulangan Proxy

Ulangan Proxy

University

35 Qs

teknologi layanan jaringan

teknologi layanan jaringan

University

40 Qs

Types of Housing Quiz

Types of Housing Quiz

12th Grade - University

39 Qs

UH 2 Jaringan Komputer X.IPA-3

UH 2 Jaringan Komputer X.IPA-3

University

35 Qs

Semi-Final Exam

Semi-Final Exam

Assessment

Quiz

Other

University

Hard

Created by

Alma Alid-ab

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Layer 2 attack will result in a switch flooding incoming frames to all ports?

MAC address overflow

Spanning Tree Protocol manipulation

IP address spoofing

ARP poisoning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

HTTP

LLDP

CDP

FTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is authentication with AAA preferred over a local database method?

It specifies a different password for each line or port.

It requires a login and password combination on the console, vty lines, and aux ports.

It provides a fallback authentication method if the administrator forgets the username or password.

It uses less network bandwidth.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server?

SSH

802.1x

RADIUS

TACACS

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which Cisco solution helps prevent MAC and IP address spoofing attacks?

Dynamic ARP Inspection

IP Source Guard

Port Security

DHCP Snooping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

false

true

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Enable port security

Disable DTP

Disable STP

Place unused ports in an unused VLAN

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?