Testout IT Network Pro 7.4.11 Practice
Questions and Answers
Which of the following scenarios would typically utilize 802.1x authentication? - Answer-
Controlling access through a switch.
You have two switches connected together as shown in the following diagram. How
many broadcast domains are in the network? - Answer- Two
You are the network administrator for a city library. Throughout the library are several
groups of computers that provide public access to the internet. Supervision of these
computers has been difficult. You've had problems with patrons bringing personal
laptops into the library and disconnecting the network cables from the library computers
to connect their laptops to the internet.
The library computers are in groups of four. Each group of four computers is connected
to a hub that's connected to the library network through an access port on a switch. You
want to restrict access to the network so that only library computers are permitted
connectivity to the internet.
What can you do? - Answer- Configure port security on the switch.
Which of the following BEST describes an ARP spoofing attack? - Answer- An attack
that associates an attacker's MAC address with the IP address of a victim's device.
Which of the following is a method of VLAN hopping? - Answer- Double tagging
Drag each description on the left to the appropriate switch attack type on the right. -
Answer- ARP spoofing/poisoning
The source device sends frames to the attacker's MAC address instead of to the correct
device.
Dynamic Trunking Protocol
Should be disabled on the switch's end user (access) ports before implementing the
switch configuration in to the network.
MAC flooding
Causes packets to fill up the forwarding table and consumes so much of the switch's
memory that it enters a state called fail open mode.
Questions and Answers
Which of the following scenarios would typically utilize 802.1x authentication? - Answer-
Controlling access through a switch.
You have two switches connected together as shown in the following diagram. How
many broadcast domains are in the network? - Answer- Two
You are the network administrator for a city library. Throughout the library are several
groups of computers that provide public access to the internet. Supervision of these
computers has been difficult. You've had problems with patrons bringing personal
laptops into the library and disconnecting the network cables from the library computers
to connect their laptops to the internet.
The library computers are in groups of four. Each group of four computers is connected
to a hub that's connected to the library network through an access port on a switch. You
want to restrict access to the network so that only library computers are permitted
connectivity to the internet.
What can you do? - Answer- Configure port security on the switch.
Which of the following BEST describes an ARP spoofing attack? - Answer- An attack
that associates an attacker's MAC address with the IP address of a victim's device.
Which of the following is a method of VLAN hopping? - Answer- Double tagging
Drag each description on the left to the appropriate switch attack type on the right. -
Answer- ARP spoofing/poisoning
The source device sends frames to the attacker's MAC address instead of to the correct
device.
Dynamic Trunking Protocol
Should be disabled on the switch's end user (access) ports before implementing the
switch configuration in to the network.
MAC flooding
Causes packets to fill up the forwarding table and consumes so much of the switch's
memory that it enters a state called fail open mode.