10-13 2S\

10-13 2S\

University

73 Qs

quiz-placeholder

Similar activities

2624 networking 2, mod 1-4

2624 networking 2, mod 1-4

University

74 Qs

Modules 1 – 3 of the CCNA1 – Introduction to Networks v7.0 (ITN)

Modules 1 – 3 of the CCNA1 – Introduction to Networks v7.0 (ITN)

University

68 Qs

ktra IoT

ktra IoT

University

78 Qs

MC3: LABORATORY 7

MC3: LABORATORY 7

University

77 Qs

23.Process-to-Process Delivery: UDP, TCP, and SCTP

23.Process-to-Process Delivery: UDP, TCP, and SCTP

University

77 Qs

Module 7-9

Module 7-9

University

75 Qs

Bank Soal AIJ Kelas XI TKJ

Bank Soal AIJ Kelas XI TKJ

KG - Professional Development

76 Qs

Y2 Module 1-4

Y2 Module 1-4

University

76 Qs

10-13 2S\

10-13 2S\

Assessment

Quiz

Other

University

Easy

Created by

Jason Rieza

Used 3+ times

FREE Resource

73 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

ARP spoofing

DHCP starvation

IP address spoofing

MAC address flooding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Disable DTP

Disable STP

Enable port security

Place unused ports in an unused VLAN

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three Cisco products focus on endpoint security solutions?

SSL/IPsec VPN Appliance

IPS Sensor Appliance

Web Security Appliance

Email Security Appliance

NAC Appliance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

true

false

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

local AAA over TACACS+

local AAA

local AAA over RADIUS

server-based AAA

server-based AAA over TACACS+

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Enable CDP on edge devices, and enable LLDP on interior devices.

Use the open standard LLDP rather than CDP.

Use the default router settings for CDP and LLDP.

Disable both protocols on all interfaces where they are not required.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

SNMP

TFTP

SSH

SCP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?