Network Protocols Quiz

Network Protocols Quiz

University

28 Qs

quiz-placeholder

Similar activities

Revision

Revision

University

28 Qs

Jaringan komputer 1 | Kuis 2

Jaringan komputer 1 | Kuis 2

University

30 Qs

Inter-VLAN Routing Quiz

Inter-VLAN Routing Quiz

University

30 Qs

Tugas AIJ

Tugas AIJ

University

25 Qs

Repaso 1 - CONMUTACIÓN EN REDES DE DATOS

Repaso 1 - CONMUTACIÓN EN REDES DE DATOS

1st Grade - University

25 Qs

 Switching Concepts, VLANs, and InterVLAN Routing Part 2

Switching Concepts, VLANs, and InterVLAN Routing Part 2

University

26 Qs

(Part 1) Modules 10 – 13: L2 Security and WLANs

(Part 1) Modules 10 – 13: L2 Security and WLANs

University

28 Qs

TUGAS_TAMBAHAN

TUGAS_TAMBAHAN

University

30 Qs

Network Protocols Quiz

Network Protocols Quiz

Assessment

Quiz

Other

University

Easy

Created by

Enrico Cuyco

Used 10+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of VRRPv3?

VRRPv3 is Cisco proprietary.

It supports IPv6 and IPv4 addressing.

It works together with HSRP.

It allows load balancing between routers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

DHCP spoofing

DHCP starvation

VLAN double-tagging

DTP spoofing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature on a switch makes it vulnerable to VLAN hopping attacks?

the mixed duplex mode enabled for all ports by default

the limited size of content-addressable memory space

mixed port bandwidth support enabled for all ports by default

the automatic trunking port feature enabled for all ports by default

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which FHRP implementation is a Cisco-proprietary protocol that supports IPv4 load sharing?

IRDP

GLBP

VRRPv3

GLBP for IPv6

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

preventing buffer overflow attacks

preventing rogue switches from being added to the network

protecting against Layer 2 loops

enforcing the placement of root bridges

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?

off

restrict

protect

shutdown

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the behavior of a switch when the MAC address table is full?

It treats frames as unknown unicast and floods all incoming frames to all ports on the switch.

It treats frames as unknown unicast and floods all incoming frames to all ports across multiple switches.

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.

It treats frames as unknown unicast and floods all incoming frames to all ports within the collision domain.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Other