Cspring10-13

Cspring10-13

University

78 Qs

quiz-placeholder

Similar activities

OCR L3 Cam Tech Unit 1 Fundamentals of IT

OCR L3 Cam Tech Unit 1 Fundamentals of IT

University

75 Qs

Active Directory Quiz

Active Directory Quiz

University

78 Qs

Computer Organization and Architecture

Computer Organization and Architecture

University

81 Qs

A+ 1002 Qs

A+ 1002 Qs

11th Grade - Professional Development

80 Qs

Module 1-4  Cisco

Module 1-4 Cisco

University

73 Qs

TLE3 Midterm Examination (CED-14-301A)

TLE3 Midterm Examination (CED-14-301A)

University

75 Qs

FINAL EXAM NETWORK FUNDAMENTALS OF NETWORK

FINAL EXAM NETWORK FUNDAMENTALS OF NETWORK

University

80 Qs

Firewalls and Network Security Study Guide Midterm

Firewalls and Network Security Study Guide Midterm

University

74 Qs

Cspring10-13

Cspring10-13

Assessment

Quiz

Computers

University

Medium

Created by

David Berryman

Used 1+ times

FREE Resource

78 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?
ARP spoofing
DHCP starvation
IP address spoofing
MAC address flooding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?
Disable DTP.
Disable STP.
Enable port security.
Place unused ports in an unused VLAN.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three Cisco products focus on endpoint security solutions? (Choose three.)
IPS Sensor Appliance
Web Security Appliance
Email Security Appliance
SSL/IPsec VPN Appliance
NAC Appliance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

? In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
true
false

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method stores usernames and passwords in the router and is ideal for small networks?
server-based AAA over TACACS+
local AAA over RADIUS
server-based AAA
local AAA over TACACS+
local AAA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?
Enable CDP on edge devices, and enable LLDP on interior devices.
Use the open standard LLDP rather than CDP.
Use the default router settings for CDP and LLDP.
Disable both protocols on all interfaces where they are not required.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?
SNMP
TFTP
SSH
SCP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?