IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNA SecurityWhat action can a network administrator take to help mitigate the threat of VLAN hopping attacks?ITExamAnswers asked 3 years ago • CCNA SecurityWhat determines which switch becomes the STP root bridge for a given VLAN?ITExamAnswers asked 4 years ago • CCNP, CCNA SecurityA cybersecurity analyst is using the macof tool to evaluate configurations of switches deployed in the backbone network of an organization. Which type of LAN attack is the analyst targeting during this evaluation?ITExamAnswers asked 4 years ago • CCNA SecurityWhich statement describes the behavior of a switch when the MAC address table is full?ITExamAnswers asked 4 years ago • CCNA SecurityIf two switches are configured with the same priority and the same extended system ID, what determines which switch becomes the root bridge?ITExamAnswers asked 3 years ago • CCNA SecurityWhen security is a concern, which OSI Layer is considered to be the weakest link in a network system?ITExamAnswers asked 3 years ago • CCNA SecurityA network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac. What is the purpose of this configuration command?ITExamAnswers asked 4 years ago • CCNA SecurityWhat is the only type of traffic that is forwarded by a PVLAN protected port to other protected ports?ITExamAnswers asked 3 years ago • CCNA SecurityA port has been configured for the 802.1X protocol and the client has successfully authenticated. Which 802.1X state is associated with this PC?ITExamAnswers asked 3 years ago • CCNA SecurityWhen using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?ITExamAnswers asked 4 years ago • CCNA, CCNA Security, CCNPWhen would the authentication port-control command be used during an 802.1X implementation?ITExamAnswers asked 3 years ago • CCNA SecurityWebsites are rated based on the latest website reputation intelligence. Which endpoint security measure prevents endpoints from connecting to websites that have a bad rating?ITExamAnswers asked 3 years ago • CCNA SecurityWhy is it important to protect endpoints?ITExamAnswers asked 3 years ago • CCNA SecurityWhich security service is provided by 802.1x?ITExamAnswers asked 4 years ago • CCNP, CCNA SecurityWhich host-based security measure is used to restrict incoming and outgoing connections?ITExamAnswers asked 3 years ago • CCNA Security