Search Header Logo

сиська 107-160

Authored by Чингисхан Нуржанов

Mathematics

University

Used 3+ times

сиська 107-160
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three techniques for mitigating VLAN attacks? (Choose three

Use private VLANs.

  • Enable BPDU guard.

  • Enable trunking manually

  • Disable DTP.

  • Set the native VLAN to an unused VLAN.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which situation would a technician use the show interfaces switch command?

to determine if remote access is enabled

when packets are being dropped from a particular directly attached host

when an end device can reach local devices, but not remote devices

to determine the MAC address of a directly attached network device on a particular interface

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?

There is no ability to provide accountability.

User accounts must be configured locally on each device, which is an unscalable authentication solution.

It is very susceptible to brute-force attacks because there is no username

The passwords can only be stored in plain text in the running configuration.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?

It sends a DHCPREQUEST that identifies which lease offer the client is accepting.

It sends a DHCPNAK and begins the DHCP process over again.

It discards both offers and sends a new DHCPDISCOVER.

It accepts both DHCPOFFER messages and sends a DHCPACK.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)

Three security violations have been detected on this interface.

  • This port is currently up.

The port is configured as a trunk link.

Security violations will cause this port to shut down immediately.

The switch port mode for this interface is access mode.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What method of wireless authentication is dependent on a RADIUS authentication server?

WEP

WPA Personal

WPA2 Personal

WPA2 Enterprise

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator has found a user sending a double-tagged 802.1Q frame to a switch. What is the best solution to prevent this type of attack?

The native VLAN number used on any trunk should be one of the active data VLANs.

The VLANs for user access ports should be different VLANs than any native VLANs used on trunk ports.

Trunk ports should be configured with port security.

Trunk ports should use the default VLAN as the native VLAN number.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?