CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks

CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial covers Layer 2 of the OSI model, focusing on MAC addresses and related security threats. It explains MAC address flooding attacks, where attackers overwhelm network switches with spoofed packets, causing them to broadcast all traffic. The tutorial also discusses broadcast storms and switching loops, which can disrupt network traffic. To mitigate these Layer 2 attacks, strategies such as MAC address filtering, static MAC assignments, disabling unused ports, and enabling protocols like spanning tree and BPDU guard are recommended.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a MAC address in a network?

To identify a network interface uniquely

To encrypt data packets

To manage IP address allocation

To establish a VPN connection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a MAC address flooding attack, what is the main goal of the attacker?

To encrypt all network traffic

To overwhelm the switch with fake MAC addresses

To create a secure network tunnel

To disable all network ports

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens to a switch when it is overwhelmed by a MAC address flooding attack?

It encrypts all data

It behaves like a hub, broadcasting all traffic

It shuts down completely

It redirects traffic to a different network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a broadcast storm, and what can cause it?

A temporary network outage due to power failure

A network slowdown caused by excessive data encryption

A flood of packets due to a faulty switch or redundant links

A security breach due to unauthorized access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a switching loop be prevented in a network?

By using dynamic IP allocation

By disabling all network ports

By enabling Spanning Tree Protocol

By using MAC address filtering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method can help limit unauthorized access to a network?

Disabling Spanning Tree Protocol

Allowing all devices to connect freely

Enabling all switch ports

Using static MAC address assignments

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended practice for unused switch ports to enhance security?

Leave them open for future use

Disable and lock them

Assign them random IP addresses

Connect them to a backup network