
Networking Quiz
Authored by Trung Chi
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which feature can validate address requests and filter out invalid messages?
IP Source Guard
port security
DHCP snooping
dynamic ARP inspection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Select the action that results from executing these commands.
A dynamically learned MAC address is saved in the startup-configuration file.
A dynamically learned MAC address is saved in the running-configuration file.
A dynamically learned MAC address is saved in the VLAN database.
Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.
Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two)
The network administrator can apply port security to dynamic access ports.
The network administrator can apply port security to EtherChannels.
When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined.
The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
The network administrator can configure static secure or sticky secure MAC addresses in the voice VLAN.
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.)
reduced cost
increased security
broadband incompatibility
scalability
better throughput
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch?
copy run start
traceroute
the ICMP Echo IP SLA
SPAN
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which keywords can be substituted for access list wildcards while configuring access lists?(Choose two.)
all
any
host
range
subnet
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which IEEE mechanism is responsible for the authentication of devices when they attempt to connect to a local network?
802.1x
802.11
802.2x 18
802.3x
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
CSNP-04103 Chapter 6 - Functions
Quiz
•
University
10 questions
Recap - Macs & PCs
Quiz
•
University
9 questions
Los periféricos del computador
Quiz
•
1st Grade - Professio...
10 questions
UBL JARKOM CHAP10
Quiz
•
University
13 questions
Repaso de capa 2
Quiz
•
University
10 questions
Quiz Ke 8 alprog if-09
Quiz
•
University
10 questions
Posttest_Exam_ISO
Quiz
•
University
10 questions
Gerak Digital Non Karakter
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade