14.5. Answers to Review Questions

  1. C. A rogue device is a device unauthorized on the network.

  2. B. The MAC address table when filled will cause traffic to flood out all ports.

  3. A. Double tagging allows an attacker to appear like they are on the same VLAN, which lets traffic hop to a VLAN it shouldn't.

  4. B. A rogue DHCP server can spoof IP addresses and make hosts send traffic to IPs where they shouldn't.

  5. B. False, disabling unused services is always a good practice.

  6. D. The host machine is authenticated in 802.1x.

  7. B. False, AAA provide multiple layers of security by authenticating devices, controlling what those devices can do, and then keeping track of what they do.

  8. C. The use of Private VLANs can save an ISP address space.

  9. B. False, backup DHCP servers would ...

Get Cisco® Network Professional's: Advanced Internetworking Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.