1. What command disables 802.1x authentication on a port and permits traffic without authentication?
A) dot1x port-control disable B) dot1x port-control force-unauthorized C) dot1x port-control force-authorized D) dot1x port-control auto
2. What is a role of access points in an enterprise network?
A) integrate with SNMP in preventing DDoS attacks B) serve as a first line of defense in an enterprise network C) support secure user logins to devices or the network D) connect wireless devices to a wired network
3. Which of the following statements best describes the result of issuing the instance 3 vlans 7 command?
A) VLAN 7 is mapped to switchport 3 B) VLAN 7 is mapped to MST instance 3 C) VLAN 7 is mapped to three MST instances. D)
4. Which of the following is true about CDP?
A) It can be used as part of a MAC address flooding attack B) It is used to generate a MAC spoofing attack C) It can be used to discover the network topology D) It is used to generate a denial of service attack
5. What attack technique attempts to fill a switching table so the attackers can capture traffic passing through a switch?
A) MAC spoofing B) MAC flooding C) VLAN hopping D) Rogue device
Leave a comment