CCNA4 Chapter 5 Exam - Online Assessment
Quiz-summary
0 of 26 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
Information
CCNA4 Chapter 5 Exam – Online Assessment
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 26 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- Answered
- Review
-
Question 1 of 26
1. Question
What is the behavior of a switch as a result of a successful CAM table attack?Correct
Incorrect
-
Question 2 of 26
2. Question
What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?Correct
Incorrect
-
Question 3 of 26
3. Question
Refer to the exhibit. Which interface on switch S1 should be configured as a DHCP snooping trusted port to help mitigate DHCP spoofing attacks?
CCNA4 v6.0 Chapter 5 Exam 006
Correct
Incorrect
-
Question 4 of 26
4. Question
When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?Correct
Incorrect
-
Question 5 of 26
5. Question
What device is considered a supplicant during the 802.1X authentication process?Correct
Incorrect
-
Question 6 of 26
6. Question
What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?Correct
Incorrect
-
Question 7 of 26
7. Question
Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?
CCNA4 v6.0 Chapter 5 Exam 002
Correct
Incorrect
-
Question 8 of 26
8. Question
What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?Correct
Incorrect
-
Question 9 of 26
9. Question
Which two protocols are used to provide server-based AAA authentication? (Choose two.)Correct
Incorrect
-
Question 10 of 26
10. Question
Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?Correct
Incorrect
-
Question 11 of 26
11. Question
What are three techniques for mitigating VLAN attacks? (Choose three.)Correct
Incorrect
-
Question 12 of 26
12. Question
Which statement describes SNMP operation?Correct
Incorrect
-
Question 13 of 26
13. Question
A network administrator is analyzing the features supported by the multiple versions of SNMP. What are two features that are supported by SNMPv3 but not by SNMPv1 or SNMPv2c? (Choose two.)Correct
Incorrect
-
Question 14 of 26
14. Question
Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?Correct
Incorrect
-
Question 15 of 26
15. Question
What is the function of the MIB element as part of a network management system?Correct
Incorrect
-
Question 16 of 26
16. Question
Which SNMP version uses weak community string-based access control and supports bulk retrieval?
Correct
Incorrect
-
Question 17 of 26
17. Question
What are SNMP trap messages?Correct
Incorrect
-
Question 18 of 26
18. Question
A network administrator issues two commands on a router:
R1(config)# snmp-server host 10.10.50.25 version 2c campus
R1(config)# snmp-server enable trapsWhat can be concluded after the commands are entered?
Correct
Incorrect
-
Question 19 of 26
19. Question
Refer to the exhibit. What can be concluded from the produced output?
CCNA4 v6.0 Chapter 5 Exam 007
Correct
Incorrect
-
Question 20 of 26
20. Question
Refer to the exhibit. A SNMP manager has IP address 172.16.1.120. The SNMP manager is unable to change configuration variables on the R1 SNMP agent. What could be the problem?
CCNA4 v6.0 Chapter 5 Exam 005
Correct
Incorrect
-
Question 21 of 26
21. Question
Refer to the exhibit. Router R1 was configured by a network administrator to use SNMP version 2. The following commands were issued:
R1(config)# snmp-server community batonaug ro SNMP_ACL
R1(config)# snmp-server contact Wayne World
R1(config)# snmp-server host 192.168.1.3 version 2c batonaug
R1(config)# ip access-list standard SNMP_ACL
R1(config-std-nacl)# permit 192.168.10.3Why is the administrator not able to get any information from R1?
CCNA4 v6.0 Chapter 5 Exam 001
Correct
Incorrect
-
Question 22 of 26
22. Question
A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)Correct
Incorrect
-
Question 23 of 26
23. Question
Which statement describes the RSPAN VLAN?Correct
Incorrect
-
Question 24 of 26
24. Question
Which statement describes the function of the SPAN tool used in a Cisco switch?Correct
Incorrect
-
Question 25 of 26
25. Question
Refer to the exhibit. Based on the output generated by the show monitor session 1 command, how will SPAN operate on the switch?
CCNA4 v6.0 Chapter 5 Exam 004
Correct
Incorrect
-
Question 26 of 26
26. Question
Refer to the exhibit. Which command or set of commands will configure SW_A to copy all traffic for the server to the packet analyzer?
CCNA4 v6.0 Chapter 5 Exam 003
Correct
Incorrect