IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 2 v7Which wireless security method requires clients to manually identify the SSID to connect to the WLAN?ITExamAnswers asked 2 years ago • CCNA 2 v7What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?ITExamAnswers asked 4 years ago • CCNP, CCNA 2 v7An AP regularly broadcasts which type of management frame?ITExamAnswers asked 2 years ago • CCNA 2 v7Port security has been enabled on interface Fa0/1 and the show port-security interface fa0/1 command has been entered. What does the Port Status “Secure-up” message indicate?ITExamAnswers asked 2 years ago • CCNA 2 v7What techniques should be done to mitigate VLAN attacks? (Choose three.)ITExamAnswers asked 2 years ago • CCNA 2 v7Port security has been enabled on a switch port. What is the default violation mode in use by default?ITExamAnswers asked 2 years ago • CCNA 2 v7What is the result of entering the ip dhcp snooping limit rate 4 interface configuration command?ITExamAnswers asked 2 years ago • CCNA 2 v7Which DAI command checks the source MAC address in the Ethernet header against the target MAC address in the ARP body?ITExamAnswers asked 2 years ago • CCNA 2 v7Assume that BPDU Guard has been enabled globally on all access ports. However, one port must not be configured with the feature. Which command would explicitly disable BPDU Guard on that switch port?ITExamAnswers asked 2 years ago • CCNA 2 v7Which port security feature enables switches to automatically learn and retain MAC addresses for each port?ITExamAnswers asked 2 years ago • CCNA 2 v7Which feature should be configured on PortFast enabled switches to prevent rogue switches from being added to a network?ITExamAnswers asked 2 years ago • CCNA 2 v7Port security has been enabled on access ports to allow a maximum of two MAC addresses. Which port security violation would drop the frame and send a notification to the syslog server if the maximum number of MAC addresses is exceeded?ITExamAnswers asked 2 years ago • CCNA 2 v7Which method would mitigate a MAC address flooding attack?ITExamAnswers asked 4 years ago • CCNA, CCNA 2 v7Which is an example of a CDP reconnaissance attack?ITExamAnswers asked 2 years ago • CCNA 2 v7Which is an example of an ARP spoofing attack?ITExamAnswers asked 2 years ago • CCNA 2 v7