IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNAA network administrator is configuring DHCP snooping on a switch. Which configuration command should be used first?ITExamAnswers asked 2 years ago • CCNAAn administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?ITExamAnswers asked 4 years ago • CCNAWhich two commands can be used to enable PortFast on a switch? (Choose two.)ITExamAnswers asked 2 years ago • CCNAWhat are two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks? (Choose two.)ITExamAnswers asked 2 years ago • CCNAWhich procedure is recommended to mitigate the chances of ARP spoofing?ITExamAnswers asked 3 years ago • CCNA, CCNA SecurityWhich two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.)ITExamAnswers asked 4 years ago • CCNAWhich command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityOn what switch ports should PortFast be enabled to enhance STP stability?ITExamAnswers asked 3 years ago • CCNP, CCNA, CCNA SecurityWhat is a recommended best practice when dealing with the native VLAN?ITExamAnswers asked 2 years ago • CCNAWhat mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?ITExamAnswers asked 4 years ago • CCNA, CCNA SecurityWhat three services are provided by the AAA framework? (Choose three.)ITExamAnswers asked 2 years ago • CCNATrue or False? In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.ITExamAnswers asked 2 years ago • CCNAWhich three Cisco products focus on endpoint security solutions? (Choose three.)ITExamAnswers asked 4 years ago • CCNAWhich Layer 2 attack will result in legitimate users not getting valid IP addresses? answered 4 years ago • CCNAWhat is the purpose of AAA accounting?ITExamAnswers asked 3 years ago • CCNP, CCNA, CCNA Security