IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA 2 v7Which is an example of an address spoofing attack?ITExamAnswers asked 2 years ago • CCNA 2 v7Which is an example of an STP attack?ITExamAnswers asked 2 years ago • CCNA 2 v7Which is an example of a DHCP starvation attack?ITExamAnswers asked 2 years ago • CCNA 2 v7Why would a threat actor launch a MAC address overflow attack on a small network?ITExamAnswers asked 2 years ago • CCNA 2 v7What happens to a compromised switch during a MAC address table attack?ITExamAnswers asked 2 years ago • CCNA 2 v7Which type of attack does IPSG mitigate?ITExamAnswers asked 2 years ago • CCNA 2 v7Which mitigation technique prevents ARP spoofing and ARP poisoning attacks?ITExamAnswers asked 2 years ago • CCNA 2 v7Which mitigation technique prevents MAC address table overflow attacks?ITExamAnswers asked 2 years ago • CCNA 2 v7Which 802.1X term is used to describe the device that is requesting authentication?ITExamAnswers asked 2 years ago • CCNA 2 v7Which 802.1X term is used to describe the device that is responsible for relaying 802.1X responses?ITExamAnswers asked 2 years ago • CCNA 2 v7Which small network router authentication method authenticates device access by referring to local usernames and passwords?ITExamAnswers asked 2 years ago • CCNA 2 v7Which AAA component is responsible for determining what access is permitted?ITExamAnswers asked 2 years ago • CCNA 2 v7Which network security device monitors and encrypts SMTP traffic to block threats and prevent data loss?ITExamAnswers asked 2 years ago • CCNA 2 v7Which of the following encrypts the data on end-devices, which can be decrypted only if a payment is made?ITExamAnswers asked 2 years ago • CCNA 2 v7Which of the following correctly describes GLBP?ITExamAnswers asked 2 years ago • CCNA 2 v7