SRWE Review Module 10-13

SRWE Review Module 10-13

University

62 Qs

quiz-placeholder

Similar activities

สอบปลายภาค เทคโนโลยีโรงแรม

สอบปลายภาค เทคโนโลยีโรงแรม

University

60 Qs

IAS2 QUIZ CH 4-6

IAS2 QUIZ CH 4-6

University

60 Qs

Numpy

Numpy

University

66 Qs

IT101-1_FINALS_MULTIPLECHOICE

IT101-1_FINALS_MULTIPLECHOICE

University

62 Qs

NETWORKING

NETWORKING

University

61 Qs

SQL DML e DDL

SQL DML e DDL

2nd Grade - Professional Development

59 Qs

Information storage

Information storage

University

65 Qs

FDBS - Final Examination

FDBS - Final Examination

University

60 Qs

SRWE Review Module 10-13

SRWE Review Module 10-13

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Gian Carlo Lim

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

62 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

MAC flooding attack

DHCP starvation attack

DNS spoofing attack
ARP poisoning attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Implement a firewall to block all incoming traffic.
Implement port security on switches to limit MAC address entries.
Disable all MAC address learning on the switch.
Increase the switch's bandwidth to handle more traffic.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is not one of the three Cisco products focus on endpoint security solutions?

  • Web Security Appliance

  • Email Security Appliance

  • NAC Appliance

  • Adaptive Security Appliance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False?
In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

False
True

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

Remote authentication
Two-factor authentication
Biometric authentication
Local authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Enable discovery protocols only on necessary interfaces.
Disable all discovery protocols entirely.
Use discovery protocols only for non-critical devices.
Enable discovery protocols on all interfaces.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

FTP (File Transfer Protocol)
HTTP (Hypertext Transfer Protocol)
RDP (Remote Desktop Protocol)
SSH (Secure Shell)

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?