Switch Security Configuration

Switch Security Configuration

11th Grade

40 Qs

quiz-placeholder

Similar activities

How the Internet Works

How the Internet Works

9th - 12th Grade

42 Qs

Latihan Exam ccna 210-245

Latihan Exam ccna 210-245

11th Grade

35 Qs

IT Fun+ - 2.3 Motherboard, PS

IT Fun+ - 2.3 Motherboard, PS

11th - 12th Grade

44 Qs

2025 UAS PAS KOMPUTER DAN JARINGAN DASAR

2025 UAS PAS KOMPUTER DAN JARINGAN DASAR

10th Grade - University

41 Qs

105p2 Final Revew

105p2 Final Revew

10th Grade - Professional Development

42 Qs

CompTIA Fundamentals Topic 1

CompTIA Fundamentals Topic 1

10th - 12th Grade

36 Qs

Networking Principles

Networking Principles

11th - 12th Grade

40 Qs

PAS TW KD-3.2

PAS TW KD-3.2

11th Grade

40 Qs

Switch Security Configuration

Switch Security Configuration

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Jeff Schichi

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To mitigate VLAN attacks, you need to configure ______.

DHCP snooping

DTP and native VLAN

ARP inspection

PortFast and BPDU Guard

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to mitigate DHCP attacks?

A) Port security

B) DTP and native VLAN

C) DHCP snooping

D) ARP inspection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To mitigate ARP attacks, you should configure ______.

Port security

ARP inspection

DHCP snooping

PortFast and BPDU Guard.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of configuring PortFast and BPDU Guard?

To mitigate STP attacks

To enhance wireless connectivity

To reduce latency

To increase bandwidth

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of implementing port security on a network switch?

To increase bandwidth

To prevent unauthorized access

To enhance data encryption

To improve network speed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port security is a feature used to restrict input to an interface by limiting and identifying ________.

IP addresses

MAC addresses

Network protocols

Data packets

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a simple method to secure a network from unauthorized access?

Enable all ports

Disable unused ports

Use the shutdown command on active ports

Ignore unused ports

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?