Switch Security Quiz

Switch Security Quiz

University

10 Qs

quiz-placeholder

Similar activities

Computer Applications in Banking and Finance Quiz

Computer Applications in Banking and Finance Quiz

University

15 Qs

Operating System

Operating System

University

15 Qs

Mikropemproses dan Mikropengawal

Mikropemproses dan Mikropengawal

12th Grade - University

15 Qs

Quiz #2 ETEC 486 | Spr. 16

Quiz #2 ETEC 486 | Spr. 16

KG - University

10 Qs

Fun with Computer Architecture

Fun with Computer Architecture

University

15 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

C++ Array Quiz

C++ Array Quiz

University

10 Qs

Information System and Modern Organization part 1

Information System and Modern Organization part 1

University

14 Qs

Switch Security Quiz

Switch Security Quiz

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

nur yusof

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a Distributed Denial of Service (DDoS) attack?

To steal confidential information

To disrupt public access to a website or service

To install antivirus software on the network

To speed up internet connectivity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of the Cisco Email Security Appliance (ESA)?

Filters malicious URLs

Encrypts web traffic

Detects and blocks email-based threats

Dynamically assigns IP addresses

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three core components of AAA?

Authentication, Application, Access

Authentication, Authorization, Accounting

Access, Addressing, Application

Antivirus, Authorization, Accounting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol does IEEE 802.1X use for port-based access control?

HTTP

SSL

EAP

FTP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack takes advantage of the MAC address table size limitation on a switch?

VLAN hopping

DHCP spoofing

MAC flooding

ARP poisoning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following helps prevent VLAN hopping attacks?

Enable trunking on all ports

Disable trunking on all access ports

Use DHCP spoofing

Enable CDP on all ports

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a DHCP starvation attack?

To steal user MAC addresses

To create a DoS for clients trying to connect

To secretly access another VLAN

To send fake ARP replies

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?