
CN2-Chapter-1
Authored by Anoop Jacob
Computers
University
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which attack encrypts the data on hosts in an attempt to extract a monetary payment from the victim?
DDoS
Data Breach
Malware
Ransomware
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which AAA component is responsible for collecting and reporting usage data for auditing and billing purposes?
Authentication
Authorization
Accounting
Client
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following mitigation techniques prevents DHCP starvation and DHCP spoofing attacks?
IPSG
DHCP Snooping
DAI
Port Security
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What mitigation technique must be implemented to prevent MAC address overflow attacks?
IPSG
DAI
Port Security
DHCP Snooping
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A threat actor sends a BPDU message with priority 0. What type of attack is this?
STP Attack
DHCP Starvation
ARP Spoofing
Address Spoofing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?