security
Which authentication method stores usernames and passwords in the router and is ideal for small networks?
local AAA
Which feature on a switch makes it vulnerable to VLAN hopping attacks?
the automatic trunking port feature enabled for all ports by default
What device is considered a supplicant during the 802.1X authentication process?
the client that is requesting authentication
Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks
the native VLAN of the trunking port being the same as a user VLAN
Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices
SSH
What are two protocols that are used by AAA to authenticate users against a central database of usernames and password?
TACACS+ RADIUS
Which access control component, implementation, or protocol collects and reports usage data?
accounting
Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?
accounting
Authorization
determines what resources users can access or the operations they are allowed to perform
Authentication
proves that users are who they say they are
Accounting
records what users do and what they access
Which access control component, implementation, or protocol audits what users actions are performed on the network?
Accounting
Which access control component, implementation, or protocol controls what users can do on the network?
Authorization
Which statement describes the behavior of a switch when the MAC address table is full?
It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.
What is the result of a DHCP starvation attack?
Legitimate clients are unable to lease IP addresses.
Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?
accounting
Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?
802.1X
Which access control component, implementation, or protocol restricts LAN access through publicly accessible switch ports?
802.1X
What are two Cisco solutions that help prevent DHCP starvation attacks?
DHCP Snooping Port Security
Which access control component, implementation, or protocol controls who is permitted to access a network?
authentication
Which access control component, implementation, or protocol is based upon usernames and passwords?
authentication
Which access control component, implementation, or protocol is implemented either locally or as a server-based solution?
authentication
What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices
Disable both protocols on all interfaces where they are not required.
Which access control component, implementation, or protocol indicates success or failure of a client-requested service with a PASS or FAIL message?
authorization
Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?
authorization