Category: CCNA v7.0
1. What is the behavior of a switch as a result of a successful MAC address table attack? The switch will shut down. The switch interfaces will transition to the error-disabled state. The switch will forward all received frames to all other ports within the VLAN. The switch …
10.3.4 Check Your Understanding – Layer 2 Security Threats Answers
1. Which of the following mitigation techniques are used to protect Layer 3 through Layer 7 of the OSI Model? (Choose three.) DHCP snooping VPN Firewalls IPSG IPS devices 2. Which of the following mitigation techniques prevents many types of attacks including MAC address table overflow and DHCP …
10.2.7 Check Your Understanding – Access Control Answers
1. Which AAA component is responsible for collecting and reporting usage data for auditing and billing purposes? Authentication Authorization Accounting 2. Which AAA component is responsible for controlling who is permitted to access the network? Authentication Authorization Accounting 3. Which AAA component is responsible for determining what the …
10.1.6 Check Your Understanding – Endpoint Security Answers
1. Which attack encrypts the data on hosts in an attempt to extract a monetary payment from the victim? DDoS Data breach Malware Ransomware 2. Which devices are specifically designed for network security? (Choose three) VPN-enabled router NGFW Switch WLC NAC 3. Which device monitors SMTP traffic to …
9.2.4 Check Your Understanding – HSRP Answers
1. What is the default HSRP priority? 50 100 150 255 2. True or False? If a router with a higher HSRP priority joins the network, it will take over the active router roll from an existing active router which has a lower priority. True False 3. During …
9.1.5 Check Your Understanding – First Hop Redundancy Protocols Answers
1. What type of device routes traffic destined to network segments beyond the source network segment for which the sending node may not have explicit routing information? virtual router standby router default gateway Layer 3 switch 2. What device presents the illusion of a single router to hosts …
8.4.9 Check Your Understanding – Configure DHCPv6 Server Answers
1. Which three DHCPv6 roles can a router perform? (Choose all that apply.) DHCPv6 client DHCPv6 relay agent DHCPv6 server 2. Which command is not configured in stateless DHCPv6? address prefix ipv6-address/prefix domain-name name dns-server server-address ipv6 dhcp server pool-name 3. An IPv6-enabled router is to acquire its …
8.3.6 Check Your Understanding – DHCPv6 Answers
1. What destination UDP port do DHCPv6 clients use to send DHCPv6 messages? 67 68 547 546 2. What DHCPv6 message does a host send to look for a DHCPv6 server? ADVERTISE SOLICIT INFORMATION-REQUEST REQUEST 3. What DHCPv6 message does a host send to the DHCPv6 server if …
8.2.7 Check Your Understanding – SLAAC Answers
1. Which two ICMPv6 messages are used in the SLAAC process? (Choose two.) Neighbor Advertisements (NA) Neighbor Solicitation (NS) Router Solicitation (RS) Router Advertisements (RA) 2. Which command must be configured on a router to enable it to join the IPv6 all-routers multicast address ff02::2? ip routing ipv6 …
8.1.5 Check Your Understanding – IPv6 GUA Assignment Answers
1. Which address type is automatically created by default on a host interface when no RAs are received? global unicast address link-local address MAC address 2. Which method best describes stateless DHCP? SLAAC only SLAAC with stateless DHCPv6 Server Stateful DHCPv6 Server