Object Oriented Programming

Object Oriented Programming

University

67 Qs

quiz-placeholder

Similar activities

LESSON5_IT11

LESSON5_IT11

University

63 Qs

CN [BSC-5th Sem]

CN [BSC-5th Sem]

University

65 Qs

TKI MODUL 3 TKJ

TKI MODUL 3 TKJ

University

62 Qs

Ôn tập network

Ôn tập network

University

68 Qs

IT223- Networking Assessment # 1

IT223- Networking Assessment # 1

University

70 Qs

mod 9-12

mod 9-12

University

65 Qs

Communicating Between Networks

Communicating Between Networks

University

68 Qs

ITE 359 Networking P2 Exam

ITE 359 Networking P2 Exam

University

65 Qs

Object Oriented Programming

Object Oriented Programming

Assessment

Quiz

Computers

University

Medium

Created by

Yuki Minami

Used 15+ times

FREE Resource

67 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

ARP spoofing

DHCP starvation

IP address spoofing

MAC address flooding

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Disable DTP.

Disable STP.

Enable port security.

Place unused ports in an unused VLAN.

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which three Cisco products focus on endpoint security solutions? (Choose three.)

Web Security Appliance

Email Security Appliance

NAC Appliance

IPS Sensor Appliance

SSL/IPsec VPN Appliance

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

True or False? In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

true

False

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

local AAA

server-based AAA over TACACS+

server-based AAA

local AAA over TACACS+

local AAA over RADIUS

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Enable CDP on edge devices, and enable LLDP on interior devices.

Use the open standard LLDP rather than CDP.

Use the default router settings for CDP and LLDP.

Disable both protocols on all interfaces where they are not required.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

SNMP

TFTP

SSH

SCP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?