Semi-Final Exam

Semi-Final Exam

University

40 Qs

quiz-placeholder

Similar activities

Quiz 1 (AIJ - Internet Gateway, NAT, Firewall)

Quiz 1 (AIJ - Internet Gateway, NAT, Firewall)

KG - Professional Development

40 Qs

Networking Quiz

Networking Quiz

University

40 Qs

สอบปลายภาค (วิชาระบบคอมพิวเตอร์และอุปกรณ์)

สอบปลายภาค (วิชาระบบคอมพิวเตอร์และอุปกรณ์)

12th Grade - University

40 Qs

Types of Housing Quiz

Types of Housing Quiz

12th Grade - University

39 Qs

KomJarDas 2 Perakitan Komputer

KomJarDas 2 Perakitan Komputer

1st Grade - University

38 Qs

UH 2 Jaringan Komputer X.IPA-3

UH 2 Jaringan Komputer X.IPA-3

University

35 Qs

TEKNOLOGI WAN 2019 XI _ SATRIYO

TEKNOLOGI WAN 2019 XI _ SATRIYO

University

40 Qs

SOAL PTS TJKN

SOAL PTS TJKN

11th Grade - University

40 Qs

Semi-Final Exam

Semi-Final Exam

Assessment

Quiz

Other

University

Hard

Created by

Alma Alid-ab

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Layer 2 attack will result in a switch flooding incoming frames to all ports?

MAC address overflow

Spanning Tree Protocol manipulation

IP address spoofing

ARP poisoning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack?

HTTP

LLDP

CDP

FTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is authentication with AAA preferred over a local database method?

It specifies a different password for each line or port.

It requires a login and password combination on the console, vty lines, and aux ports.

It provides a fallback authentication method if the administrator forgets the username or password.

It uses less network bandwidth.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a server-based AAA implementation, which protocol will allow the router to successfully communicate with the AAA server?

SSH

802.1x

RADIUS

TACACS

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which Cisco solution helps prevent MAC and IP address spoofing attacks?

Dynamic ARP Inspection

IP Source Guard

Port Security

DHCP Snooping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False? In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

false

true

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Enable port security

Disable DTP

Disable STP

Place unused ports in an unused VLAN

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?