CCNA Security - Chapter 6

Is this your test? Login to manage it. If not, you can build an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which frames are spoofed in STP manipulation attacks?
2.
1 point
Which option best describes a MAC address spoofing attack?
3.
1 point
As a recommended practice for Layer 2 security, how should VLAN 1 be treated?
4.
1 point
Which Cisco endpoint security product helps maintain network stability by providing posture assessment, quarantining of noncompliant systems, and remediation of noncompliant systems?
5.
1 point
An administrator wants to prevent a rogue Layer 2 device from intercepting traffic from multiple VLANs on a network. Which two actions help mitigate this type of activity? (Choose two.)
6.
1 point
Which device supports the use of SPAN to enable monitoring of malicious activity?
7.
1 point
When configuring a switch port for port security, what is the default violation mode?
8.
1 point
If a switch is configured with the storm-control command and the action shutdown and action trap parameters, which two actions does the switch take when a storm occurs on a port? (Choose two.)
9.
1 point
Which technology is used to protect the switched infrastructure from problems caused by receiving BPDUs on ports that should not be receiving them?
10.
1 point
Which three statements are true regarding SPAN and RSPAN? (Choose three.)
11.
1 point
Which three switch security commands are required to enable port security on a port so that it will dynamically learn a single MAC address and disable the port if a host with any other MAC address is connected? (Choose three.)
12.
1 point
Which attack relies on the default automatic trunking configuration on most Cisco switches?
13.
1 point
Which attack is mitigated by using port security?
14.
1 point
How is a reflector port used in an RSPAN configuration?
15.
1 point
Which two elements are part of the Cisco strategy for addressing endpoint security? (Choose two.)
16.
1 point
How many Cisco Security Agent clients can one Management Center for CSA console support?
17.
1 point
Which two measures are recommended to mitigate VLAN hopping attacks? (Choose two.)
18.
1 point
What happens when the MAC address notification feature is enabled on a switch?
19.
1 point
Refer to the exhibit. Based on the output generated by the show monitor session 1 command, how will SPAN operate on the switch?
20.
1 point
Which three are SAN transport technologies? (Choose three.)
21.
1 point
With IP voice systems on data networks, which two types of attacks target VoIP specifically? (Choose two.)