Search Header Logo

Networking 3/4 7.1-7.4 Test Review

Authored by Bradford Scott

Computers

9th - 12th Grade

Networking 3/4 7.1-7.4 Test Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which level of the OSI model does a Layer 2 switch operate at?

Data Link layer

Transportation layer

Network layer

Session layer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a device that can send and receive data simultaneously?

Honeypot

Unmanaged

Managed

Full-duplex

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios would typically utilize 802.1x authentication?

Controlling access through a router.

Authenticating VPN users through the internet.

Controlling access through a switch.

Authenticating remote access clients.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that's connected to the library network through an access port on a switch. You want to restrict access to the network so that only library computers are permitted connectivity to the internet. What can you do?

Create static MAC addresses for each computer and associate each address with a VLAN.

Create a VLAN for each group of four computers.

Configure port security on the switch.

Remove the hub and place each library computer on its own access port.

5.

CATEGORIZE QUESTION

3 mins • 1 pt

Drag each description on the left to the appropriate switch attack type on the right.

Groups:

(a) ARP spoofing/poisoning

,

(b) Dynamic Trunking Protocol

,

(c) MAC flooding

,

(d) MAC spoofing

Media Image
Media Image
Media Image
Media Image

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the ip address dhcp command allow you to do?

Configure a switch to act as a DHCP server.

Specify the DHCP relay server for forwarding DHCP packets

Configure a switch to obtain an IP address from a DHCP server.

Send the DHCP server address for all connected devices.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature prevents switching loops and ensures that there is only a single active path between any two switches?

Spanning Tree

Trunking

PoE

802.1x

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?