14.4. Review Questions
A device that is attached to the network without authorization could potentially cause harm; what do you call this type of device?
Free upgrade
Switch
Rogue device
Manager's computer
MAC flooding attacks are accomplished by filling what table on a switch?
ARP table
MAC address table
IP address table
Name table
Double tagging is an example of what kind of attack?
VLAN hopping
Spoofing
MAC address
ARP caching
Placing an unauthorized DHCP server on the network is an example of what kind of attack?
VLAN hopping
Spoofing
MAC address
ARP caching
Disabling unused or unnecessary services is a poor security practice.
True
False
Maybe
Always
802.1x helps to secure the network by authenticating what?
Server
Switch
Router
Host machine
AAA is a service that does ...
Get Cisco® Network Professional's: Advanced Internetworking Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.