Networking 3/4 7.1-7.4 Test Review

Networking 3/4 7.1-7.4 Test Review

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Module 10 Post - Assessment

Module 10 Post - Assessment

11th Grade

25 Qs

AIJ XI - KD 3.1 - VLAN

AIJ XI - KD 3.1 - VLAN

11th Grade

20 Qs

PTS AIJ XI TKJ 2020

PTS AIJ XI TKJ 2020

11th Grade

20 Qs

UH KONSEP VLAN

UH KONSEP VLAN

1st Grade - University

25 Qs

Module 3 VLAN New

Module 3 VLAN New

11th Grade

25 Qs

Quiz AIJ #1 - Grade XI Offering A/B

Quiz AIJ #1 - Grade XI Offering A/B

11th Grade

20 Qs

POST_TEST CCNP

POST_TEST CCNP

12th Grade - Professional Development

20 Qs

Networking 3/4 7.1-7.4 Test Review

Networking 3/4 7.1-7.4 Test Review

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Bradford Scott

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which level of the OSI model does a Layer 2 switch operate at?

Data Link layer

Transportation layer

Network layer

Session layer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a device that can send and receive data simultaneously?

Honeypot

Unmanaged

Managed

Full-duplex

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios would typically utilize 802.1x authentication?

Controlling access through a router.

Authenticating VPN users through the internet.

Controlling access through a switch.

Authenticating remote access clients.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that's connected to the library network through an access port on a switch. You want to restrict access to the network so that only library computers are permitted connectivity to the internet. What can you do?

Create static MAC addresses for each computer and associate each address with a VLAN.

Create a VLAN for each group of four computers.

Configure port security on the switch.

Remove the hub and place each library computer on its own access port.

5.

CLASSIFICATION QUESTION

3 mins • 1 pt

Drag each description on the left to the appropriate switch attack type on the right.

Groups:

(a) ARP spoofing/poisoning

,

(b) Dynamic Trunking Protocol

,

(c) MAC flooding

,

(d) MAC spoofing

Media Image
Media Image
Media Image
Media Image

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the ip address dhcp command allow you to do?

Configure a switch to act as a DHCP server.

Specify the DHCP relay server for forwarding DHCP packets

Configure a switch to obtain an IP address from a DHCP server.

Send the DHCP server address for all connected devices.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature prevents switching loops and ensures that there is only a single active path between any two switches?

Spanning Tree

Trunking

PoE

802.1x

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?