S & R CH. 10-13 Part 4
What is the result of a DHCP starvation attack?
Legitimate clients are unable to lease IP addresses
The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?
accidental interference
Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?
the native VLAN of the trunking port being the same as a user VLAN
What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)
-TACACS+ -RADIUS
Match each functional component of AAA with its description. (Not all options are used.)
Authorization- determines what resources users can access or the operations they are allowed to perform Authentication- proves that users are who they say they are Accounting- records what users do and what they access
What is the function provided by CAPWAP protocol in a corporate wireless network?
CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?
Packets with unknown source addresses will be dropped
A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?
RADIUS
A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band
Refer to the exhibit. What can be determined about port security from the information that is shown?
The port violation mode is the default for any port that has port security enabled