CCNA 2 Exam 4 pt. 2 of 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

authentication

Which access control component, implementation, or protocol is based upon usernames and passwords?

The port violation mode is the default for any port that has port security enabled.

Refer to the exhibit. What can be determined about port security from the information that is shown?

shutdown

An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?

Packets with unknown source addresses will be dropped.

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Clients will have to manually identify the SSID to connect to the network.​

What is an advantage of SSID cloaking?​

CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.

What is the function provided by CAPWAP protocol in a corporate wireless network?

Legitimate clients are unable to lease IP addresses.

What is the result of a DHCP starvation attack?

wireless network password AP password SSID

Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)

DHCP snooping and port security

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

wireless local-area network

Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?

7 Explanation: The DHCP snooping configuration includes building the DHCP Snooping Binding Database and assigning necessary trusted ports on switches.

Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

TACACS+ RADIUS

What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)

accounting

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

Ensure that the wireless NIC is enabled. Ensure that the wireless SSID is chosen.

A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)

RADIUS

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

Authentication------>Proves that users are who they say they are Authorization-------->determines the resources that users can access or operations they are allowed to perform Accounting---------->Records User activity, what they do and what they access

Match each functional component of AAA with its description. (Not all options are used.)

accidental interference

The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

Enable trunking manually. Disable DTP. Set the native VLAN to an unused VLAN.

What are three techniques for mitigating VLAN attacks? (Choose three.)

the native VLAN of the trunking port being the same as a user VLAN

Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?


Set pelajaran terkait

English Composition - Reading Quiz

View Set

Biology: QUIZ 2: BODY FRAMEWORK AND REPRODUCTION

View Set

FINAL EXAM Business 101 Chapter 9

View Set

Public Speaking Chapter 4: Listening Skills

View Set

IBM Planning Analytics Workspace V2.0.0 Explore Data Home 17/30 testing

View Set

CISSP Official ISC2 practice tests - Domain 2

View Set