This exam assesses knowledge on network security within the CCNA curriculum, focusing on CAM table attacks, DHCP spoofing, and 802.1X authentication.
DHCP starvation
DHCP spoofing
IP address spoofing
CAM table attack
Rate this question:
G0/23
G0/1
G0/24
G0/22
Rate this question:
the switch that the client is connected to
the authentication server
the supplicant
the router that is serving as the default gateway
Rate this question:
The client that is requesting authentication
The switch that is controlling network access
the authentication server that is performing client authentication
The router that is serving as the default gateway
Rate this question:
There is no ability to provide accountability.
It is very susceptible to brute-force attacks because there is no username.
The passwords can only be stored in plain text in the running configuration.
User accounts must be configured locally on each device, which is an unscalable authentication solution.
Rate this question:
1
3
5
7
Rate this question:
RADIUS
TACACS+
SSH MD5
MD5
Rate this question:
SSH
TACACS+
RADIUS
802.1x
SNMP
Rate this question:
802.1x
RADIUS
TACACS+
SSH
Rate this question:
Disable DTP.
Enable trunking manually.
Set the native VLAN to an unused VLAN.
Enable BPDU guard.
Enable Source Guard.
Use private VLANs.
Rate this question:
An NMS periodically polls the SNMP agents that are residing on managed devices by using traps to query the devices for data.​
A get request is used by the SNMP agent to query the device for data.​
An SNMP agent that resides on a managed device collects information about the device and stores that information remotely in the MIB that is located on the NMS.​
A set request is used by the NMS to change configuration variables in the agent device.
Rate this question:
bulk retrieval of MIB information
message source validation
community-based security
message encryption
SNMP trap mechanism
Rate this question:
SNMP
Syslog
NTP
NetFlow
Rate this question:
to store data about a device
to collect data from SNMP agents
to change configurations on SNMP agents
to send and retrieve network management information
Rate this question:
SNMPv2c
SNMPv1
SNMPv2Classic
SNMPv3​
Rate this question:
messages that are used by the NMS to query the device for data
unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network
messages that are used by the NMS to change configuration variables in the agent device
messages that are sent periodically by the NMS to the SNMP agents that reside on managed devices to query the device for data
Rate this question:
No traps are sent, because the notification-types argument was not specified yet.
Traps are sent with the source IP address as 10.10.50.25.
If an interface comes up, a trap is sent to the server.
The snmp-server enable traps command needs to be used repeatedly if a particular subset of trap types is desired.
Rate this question:
An ACL was configured to restrict SNMP access to an SNMP manager.
This is the output of the show snmp command without any parameters.
The system contact was not configured with the snmp-server contact command.
The location of the device was not configured with the snmp-server location command.
Rate this question:
The ACL of ACL_SNMP has not been implemented on an interface yet.
The IP address of the SNMP manager must be 172.16.1.1.
The SNMP agent should have traps disabled.
The SNMP agent is not configured for write access.
Rate this question:
The snmp-server enable traps command is missing.​
The snmp-server community command needs to include the rw keyword.​
There is a problem with the ACL configuration.
The snmp-server location command is missing.​
Rate this question:
It adds a new user to the SNMP group.
It restricts SNMP access to defined SNMP managers.
It forces the network manager to log into the agent to retrieve the SNMP messages.
It uses the MD5 authentication of the SNMP messages.
It allows a network administrator to configure a secret encrypted password on the SNMP server.
Rate this question:
The RSPAN VLAN must be the same as the native VLAN.
The RSPAN VLAN can be used to carry secure traffic between switches.
The RSPAN VLAN can be used for remote management of network switches.
The RSPAN VLAN must be the same on both the source and destination switch.
Rate this question:
It supports the SNMP trap operation on a switch.
It provides interconnection between VLANs over multiple switches.
It is a secure channel for a switch to send logging to a syslog server.
It copies the traffic from one switch port and sends it to another switch port that is connected to a monitoring device.
Rate this question:
All traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to FastEthernet 0/1.
All traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1.
Native VLAN traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1.
Native VLAN traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to FastEthernet 0/1.
Rate this question:
Sw_A(config)# monitor session 5 source interface gi0/1Sw_A(config)# monitor session 6 destination interface fa0/7
Sw_A(config)# monitor session 5 source interface gi0/1Sw_A(config)# monitor session 5 destination interface fa0/7
Sw_A(config)# monitor session 1 destination interface fa0/7
Sw_A(config)# monitor session 1 destination interface gi0/1Sw_A(config)# monitor session 1 source interface fa0/1
Sw_A(config)# monitor session 1 source interface fa0/7
Rate this question:
Quiz Review Timeline (Updated): Jul 12, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.