Cisco 2, Module 11

Cisco 2, Module 11

12th Grade

15 Qs

quiz-placeholder

Similar activities

แบบทดสอบความรู้ทั่วไปเกี่ยวกับคอมพิวเตอร์และเทคโนโลยีสารสนเทศ

แบบทดสอบความรู้ทั่วไปเกี่ยวกับคอมพิวเตอร์และเทคโนโลยีสารสนเทศ

9th - 12th Grade

12 Qs

Guess the Retro Computer 1

Guess the Retro Computer 1

KG - Professional Development

13 Qs

Module 20 - Essentials of Networking 1

Module 20 - Essentials of Networking 1

9th - 12th Grade

20 Qs

SMKN 4 Jakarta Quiz MikroTik Dasar

SMKN 4 Jakarta Quiz MikroTik Dasar

12th Grade

16 Qs

Identifying devices

Identifying devices

12th Grade

11 Qs

Remidi UTS AIJ

Remidi UTS AIJ

12th Grade

20 Qs

Quiz-OSI Layers

Quiz-OSI Layers

12th Grade

15 Qs

Exa.T1_Sistemas Operativos II 24 - 25

Exa.T1_Sistemas Operativos II 24 - 25

12th Grade

12 Qs

Cisco 2, Module 11

Cisco 2, Module 11

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Jon Casteel

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 7 pts

Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.)

DHCP snooping

extended ACL

port security

DHCP server failover

strong password on DHCP servers

2.

MULTIPLE CHOICE QUESTION

45 sec • 7 pts

What is the best way to prevent a VLAN hopping attack?

  1. Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.

  1. Use VLAN 1 as the native VLAN on trunk ports.

  1. Use ISL encapsulation on all trunk links.

  1. Disable STP on all nontrunk ports.

3.

MULTIPLE CHOICE QUESTION

45 sec • 7 pts

Which procedure is recommended to mitigate the chances of ARP spoofing?

  1. Enable DAI on the management VLAN.

  1. Enable DHCP snooping on selected VLANs.

  1. Enable port security globally.

  1. Enable IP Source Guard on trusted ports.

4.

MULTIPLE SELECT QUESTION

45 sec • 7 pts

What are two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks? (Choose two.)

  1. unknown port

  1. trusted DHCP port

  1. established DHCP port

  1. untrusted port

  1. authorized DHCP port

5.

MULTIPLE SELECT QUESTION

45 sec • 7 pts

Which two commands can be used to enable PortFast on a switch? (Choose two.)

  1. S1(config)# spanning-tree portfast default

  1. S1(config-line)# spanning-tree portfast

  1. S1(config)# enable spanning-tree portfast default

  1. S1(config-if)# enable spanning-tree portfast

  1. S1(config-if)# spanning-tree portfast

6.

MULTIPLE CHOICE QUESTION

45 sec • 6 pts

An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?

  1. Reboot the switch.

  1. Issue the no switchport port-security violation shutdown command on the interface.

  1. Issue the shutdown command followed by the no shutdown command on the interface.

  1. Issue the no switchport port-security command, then re-enable port security.

7.

MULTIPLE CHOICE QUESTION

45 sec • 7 pts

A network administrator is configuring DHCP snooping on a switch. Which configuration command should be used first?

  1. ip dhcp snooping limit rate

  1. ip dhcp snooping

  1. ip dhcp snooping vlan

  1. ip dhcp snooping trust

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?