(Part 2) Modules 10 – 13: L2 Security and WLANs

(Part 2) Modules 10 – 13: L2 Security and WLANs

University

30 Qs

quiz-placeholder

Similar activities

แบบทดสอบ IoT

แบบทดสอบ IoT

University

25 Qs

Computing Quiz 1

Computing Quiz 1

University

25 Qs

jaringan dasar 2

jaringan dasar 2

University

31 Qs

EtherChannel and HSRP Quiz

EtherChannel and HSRP Quiz

University

35 Qs

Networking Concepts

Networking Concepts

12th Grade - University

25 Qs

BASIC CONFIG,SWITH & BRIDGE MIKROTIK

BASIC CONFIG,SWITH & BRIDGE MIKROTIK

University

30 Qs

UPRICCNASEP1

UPRICCNASEP1

University

30 Qs

Common Network Ports

Common Network Ports

University

33 Qs

(Part 2) Modules 10 – 13: L2 Security and WLANs

(Part 2) Modules 10 – 13: L2 Security and WLANs

Assessment

Quiz

Other

University

Easy

Created by

awit yawa

Used 11+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

  • DHCP Snooping

  • IP Source Guard

  • Dynamic ARP Inspection

  • Port Security

  • Web Security Appliance

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three techniques for mitigating VLAN attacks? (Choose three.)

  • Enable trunking manually.

  • Disable DTP.

  • Enable Source Guard.

  • Set the native VLAN to an unused VLAN.

  • Use private VLANs.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Refer to the exhibit. What can be determined about port security from the information that is shown?

  • The port has the maximum number of MAC addresses that is supported by a Layer 2 switch port which is configured for port security.

  • The port has been shut down.

  • The port violation mode is the default for any port that has port security enabled.

  • The port has two attached devices.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

  • AAA

  • NAT

  • RADIUS

  • SNMP

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

  • Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.

  • Update the firmware on the new router.

  • Configure devices to use a different channel.

  • Change the SSID.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

  • improperly configured devices

  • rogue access points

  • accidental interference

  • interception of data

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the function provided by CAPWAP protocol in a corporate wireless network?

  • CAPWAP creates a tunnel on Transmission Control Protocol (TCP) ports in order to allow a WLC to configure an autonomous access point.

  • CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.

  • CAPWAP provides connectivity between an access point using IPv6 addressing and a wireless client using IPv4 addressing.

  • CAPWAP provides the encryption of wireless user traffic between an access point and a wireless client.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?