
Cisco 109-155 (50)

Quiz
•
Computers
•
KG
•
Easy
Злата Кобринец
Used 7+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
In which situation would a technician use the show interfaces switch command?
to determine if remote access is enabled
when packets are being dropped from a particular directly attached host
when an end device can reach local devices, but not remote devices
to determine the MAC address of a directly attached network device on a particular interface
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?
There is no ability to provide accountability.
User accounts must be configured locally on each device, which is an unscalable authentication solution.
It is very susceptible to brute-force attacks because there is no username.
The passwords can only be stored in plain text in the running configuration.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What action does a DHCPv4 client take if it receives more than one DHCPOFFER from multiple DHCP servers?
It sends a DHCPREQUEST that identifies which lease offer the client is accepting.
It sends a DHCPNAK and begins the DHCP process over again.
It discards both offers and sends a new DHCPDISCOVER.
It accepts both DHCPOFFER messages and sends a DHCPACK.
4.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Refer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)
Three security violations have been detected on this interface.
This port is currently up.
The port is configured as a trunk link.
Security violations will cause this port to shut down immediately.
The switch port mode for this interface is access mode.
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What method of wireless authentication is dependent on a RADIUS authentication server?
WEP
WPA Personal
WPA2 Personal
WPA2 Enterprise
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A network administrator has found a user sending a double-tagged 802.1Q frame to a switch. What is the best solution to prevent this type of attack?
The native VLAN number used on any trunk should be one of the active data VLANs.
The VLANs for user access ports should be different VLANs than any native VLANs used on trunk ports.
Trunk ports should be configured with port security.
Trunk ports should use the default VLAN as the native VLAN number.
7.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Refer to the exhibit. Which two conclusions can be drawn from the output? (Choose two.)
The EtherChannel is down.
The port channel ID is 2.
The port channel is a Layer 3 channel.
The bundle is fully operational.
The load-balancing method used is source port to destination por
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
AIJ Ulangan Harian kelas XI

Quiz
•
11th Grade
45 questions
PTS AIJ XI TKJ | 2022/2023

Quiz
•
11th Grade
50 questions
QUIS XII TKJ 1&2

Quiz
•
KG
45 questions
VLAN

Quiz
•
10th - 12th Grade
45 questions
ADMINISTRASI INFRAKSTRUKTUR JARINGAN

Quiz
•
12th Grade
50 questions
PAS ADMINISTRASI INFRASTRUKTUR JARINGAN-XII TKJ

Quiz
•
12th Grade
50 questions
ITE 383: Network Security P2 EXAM

Quiz
•
University
47 questions
Modules 1 – 4: Switching Concepts, VLANs, and InterVLAN

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade