IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNPWhat are two purposes for an attacker launching a MAC table flood? (Choose two.)ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0What is one way to mitigate ARP spoofing?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0What is one way to mitigate spanning-tree compromises?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0Refer to the exhibit. A switch is being configured to support AAA authentication on the console connection. Given the information in the exhibit, which three statements are correct? (Choose three.)ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0Refer to the exhibit. Network policy dictates that security functions should be administered using AAA. Which configuration would create a default login authentication list that uses RADIUS as the first authentication method, the enable password as the second method, and the local database as the final method?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0Refer to the exhibit. Given the configuration on the ALSwitch, what is the end result?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0How should unused ports on a switch be configured in order to prevent VLAN hopping attacks?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0Which countermeasure can be implemented to determine the validity of an ARP packet, based on the valid MACaddresstoIP address bindings stored in a DHCP snooping database?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0Refer to the exhibit. A network engineer is securing a network against DHCP spoofing attacks. On all switches, the engineer applied the ip dhcp snooping command and enabled DHCP snooping on all VLANs with the ip dhcp snooping vlan command. What additional step should be taken to configure the security required on the network?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0All access ports on a switch are configured with the administrative mode of dynamic auto. An attacker, connected to one of the ports, sends a malicious DTP frame. What is the intent of the attacker?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0Which configuration guideline applies to using the capture option in VACL?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0Refer to the exhibit. Which statement is true about the VSPAN configuration on switch SW1?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0Refer to the exhibit. Which statement is true about the local SPAN configuration on switch SW1?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0Which statement is true about a local SPAN configuration?ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0When using RPR, what two events can trigger a switchover from the active to the standby Supervisor Engine? (Choose two.)ITExamAnswers asked 2 years ago • CCNP, CCNP SWITCH v6.0