14.4. Review Questions

  1. A device that is attached to the network without authorization could potentially cause harm; what do you call this type of device?

    1. Free upgrade

    2. Switch

    3. Rogue device

    4. Manager's computer

  2. MAC flooding attacks are accomplished by filling what table on a switch?

    1. ARP table

    2. MAC address table

    3. IP address table

    4. Name table

  3. Double tagging is an example of what kind of attack?

    1. VLAN hopping

    2. Spoofing

    3. MAC address

    4. ARP caching

  4. Placing an unauthorized DHCP server on the network is an example of what kind of attack?

    1. VLAN hopping

    2. Spoofing

    3. MAC address

    4. ARP caching

  5. Disabling unused or unnecessary services is a poor security practice.

    1. True

    2. False

    3. Maybe

    4. Always

  6. 802.1x helps to secure the network by authenticating what?

    1. Server

    2. Switch

    3. Router

    4. Host machine

  7. AAA is a service that does ...

Get Cisco® Network Professional's: Advanced Internetworking Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.