security

Ace your homework & exams now with Quizwiz!

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

local AAA

Which feature on a switch makes it vulnerable to VLAN hopping attacks?

the automatic trunking port feature enabled for all ports by default

What device is considered a supplicant during the 802.1X authentication process?

the client that is requesting authentication

Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks

the native VLAN of the trunking port being the same as a user VLAN

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices

SSH

What are two protocols that are used by AAA to authenticate users against a central database of usernames and password?

TACACS+ RADIUS

Which access control component, implementation, or protocol collects and reports usage data?

accounting

Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?

accounting

Authorization

determines what resources users can access or the operations they are allowed to perform

Authentication

proves that users are who they say they are

Accounting

records what users do and what they access

Which access control component, implementation, or protocol audits what users actions are performed on the network?

Accounting

Which access control component, implementation, or protocol controls what users can do on the network?

Authorization

Which statement describes the behavior of a switch when the MAC address table is full?

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.

What is the result of a DHCP starvation attack?

Legitimate clients are unable to lease IP addresses.

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

accounting

Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?

802.1X

Which access control component, implementation, or protocol restricts LAN access through publicly accessible switch ports?

802.1X

What are two Cisco solutions that help prevent DHCP starvation attacks?

DHCP Snooping Port Security

Which access control component, implementation, or protocol controls who is permitted to access a network?

authentication

Which access control component, implementation, or protocol is based upon usernames and passwords?

authentication

Which access control component, implementation, or protocol is implemented either locally or as a server-based solution?

authentication

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices

Disable both protocols on all interfaces where they are not required.

Which access control component, implementation, or protocol indicates success or failure of a client-requested service with a PASS or FAIL message?

authorization

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

authorization


Related study sets

Biology for Science Majors I- BIOL 1406 Callie Price, Syllabus quiz

View Set

Computer Concepts Quiz Questions

View Set

Auditing Chapter 19 Multiple Choice

View Set

Unité 4. Lire, c'est s'envoler ailleurs.

View Set

Human Anatomy: Chapter 5 Integumentary System

View Set

Advanced Computer Science Chapter 1

View Set

Human Nutrition and Wellness Exam Ch 1-4

View Set

Ag. Econ Chapter 1 Review Questions

View Set