
SRWE Review Module 10-13
Authored by Gian Carlo Lim
Information Technology (IT)
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
62 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Layer 2 attack will result in legitimate users not getting valid IP addresses?
DHCP starvation attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is not one of the three Cisco products focus on endpoint security solutions?
Web Security Appliance
Email Security Appliance
NAC Appliance
Adaptive Security Appliance
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False?
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication method stores usernames and passwords in the router and is ideal for small networks?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?