1. What command disables 802.1x authentication on a port and permits traffic without authentication?
A) dot1x port-control disable
B) dot1x port-control force-unauthorized
C) dot1x port-control force-authorized
D) dot1x port-control auto
2. What is a role of access points in an enterprise network?
A) integrate with SNMP in preventing DDoS attacks
B) serve as a first line of defense in an enterprise network
C) support secure user logins to devices or the network
D) connect wireless devices to a wired network
3. Which of the following statements best describes the result of issuing the instance 3 vlans 7 command?
A) VLAN 7 is mapped to switchport 3
B) VLAN 7 is mapped to MST instance 3
C) VLAN 7 is mapped to three MST instances.
D)
4. Which of the following is true about CDP?
A) It can be used as part of a MAC address flooding attack
B) It is used to generate a MAC spoofing attack
C) It can be used to discover the network topology
D) It is used to generate a denial of service attack
5. What attack technique attempts to fill a switching table so the attackers can capture traffic passing through a switch?
A) MAC spoofing
B) MAC flooding
C) VLAN hopping
D) Rogue device