CCNA 4 v6.0 R&S Connecting Networks CN Chapter 5 Exam Online
CCNA 4 v6.0 CN Chapter 5 Exam Training | |
---|---|
Time | 30 minutes |
Questions | 26 |
Leaderboard: CCNA 4 v6.0 Chapter 5 Exam
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Quiz-summary
0 of 26 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
Information
CCNA 4 v6.0 Chapter 5 Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 26 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- Answered
- Review
-
Question 1 of 26
1. Question
1 pointsWhat is the behavior of a switch as a result of a successful CAM table attack?
Correct
Incorrect
-
Question 2 of 26
2. Question
1 pointsWhat network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?
Correct
Incorrect
-
Question 3 of 26
3. Question
1 pointsRefer to the exhibit.
Which interface on switch S1 should be configured as a DHCP snooping trusted port to help mitigate DHCP spoofing attacks?
Correct
Incorrect
-
Question 4 of 26
4. Question
1 pointsWhen using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?
Correct
Incorrect
-
Question 5 of 26
5. Question
1 pointsWhat device is considered a supplicant during the 802.1X authentication process?
Correct
Incorrect
-
Question 6 of 26
6. Question
1 pointsWhat is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?
Correct
Incorrect
-
Question 7 of 26
7. Question
1 pointsRefer to the exhibit.
PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?
Correct
Incorrect
-
Question 8 of 26
8. Question
1 pointsWhat protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?
Correct
Incorrect
-
Question 9 of 26
9. Question
2 pointsWhich two protocols are used to provide server-based AAA authentication? (Choose two.)
Correct
Incorrect
-
Question 10 of 26
10. Question
1 pointsWhich protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?
Correct
Incorrect
-
Question 11 of 26
11. Question
3 pointsWhat are three techniques for mitigating VLAN attacks? (Choose three.)
Correct
Incorrect
-
Question 12 of 26
12. Question
1 pointsWhich statement describes SNMP operation?
Correct
Incorrect
-
Question 13 of 26
13. Question
2 pointsA network administrator is analyzing the features supported by the multiple versions of SNMP. What are two features that are supported by SNMPv3 but not by SNMPv1 or SNMPv2c? (Choose two.)
Correct
Incorrect
-
Question 14 of 26
14. Question
1 pointsWhich protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?
Correct
Incorrect
-
Question 15 of 26
15. Question
1 pointsWhat is the function of the MIB element as part of a network management system?
Correct
Incorrect
-
Question 16 of 26
16. Question
1 pointsWhich SNMP version uses weak community string-based access control and supports bulk retrieval?
Correct
Incorrect
-
Question 17 of 26
17. Question
1 pointsWhat are SNMP trap messages?
Correct
Incorrect
-
Question 18 of 26
18. Question
1 pointsA network administrator issues two commands on a router:
Correct
Incorrect
-
Question 19 of 26
19. Question
1 pointsRefer to the exhibit.
What can be concluded from the produced output?
Correct
Incorrect
-
Question 20 of 26
20. Question
1 pointsRefer to the exhibit.
A SNMP manager has IP address 172.16.1.120. The SNMP manager is unable to change configuration variables on the R1 SNMP agent. What could be the problem?
Correct
Incorrect
-
Question 21 of 26
21. Question
1 pointsRefer to the exhibit.
Router R1 was configured by a network administrator to use SNMP version 2. The following commands were issued:
R1(config)# snmp-server community batonaug ro SNMP_ACL
R1(config)# snmp-server contact Wayne World
R1(config)# snmp-server host 192.168.1.3 version 2c batonaug
R1(config)# ip access-list standard SNMP_ACL
R1(config-std-nacl)# permit 192.168.10.3Why is the administrator not able to get any information from R1?
Correct
Incorrect
-
Question 22 of 26
22. Question
2 pointsA network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)
Correct
Incorrect
-
Question 23 of 26
23. Question
1 pointsWhich statement describes the RSPAN VLAN?
Correct
Incorrect
-
Question 24 of 26
24. Question
1 pointsWhich statement describes the function of the SPAN tool used in a Cisco switch?
Correct
Incorrect
-
Question 25 of 26
25. Question
1 pointsRefer to the exhibit.
Based on the output generated by the show monitor session 1 command, how will SPAN operate on the switch?
Correct
Incorrect
-
Question 26 of 26
26. Question
1 pointsRefer to the exhibit.
Which command or set of commands will configure SW_A to copy all traffic for the server to the packet analyzer?
Correct
Incorrect