Routing & Switching Security II
LATEST MIDTERM GUIDE
Q&S
©2024/2025
,1. Which of the following technologies is primarily used to
prevent loops in a switched network?
A) VLAN Trunking Protocol (VTP)
B) Spanning Tree Protocol (STP)
C) Rapid Spanning Tree Protocol (RSTP)
D) Link Aggregation Control Protocol (LACP)
Correct Answer: B) Spanning Tree Protocol (STP)
Rationale: STP is designed to prevent loops by
blocking redundant paths in a network.
2. Which of the following protocols authenticates each
routing update in order to guard against routing attacks?
A) BGP
B) OSPF
C) EIGRP
D) RIPv2
Correct Answer: B) OSPF
Rationale: OSPF uses various forms of authentication
for routing update protection, such as plaintext and MD5.
3. Which IPsec protocol is mainly responsible for the
actual encryption of packet data?
A) AH (Authentication Header)
B) ESP (Encapsulating Security Payload)
C) IKE (Internet Key Exchange)
D) GRE (Generic Routing Encapsulation)
©2024/2025
, Correct Answer: B) ESP (Encapsulating Security
Payload)
Rationale: ESP encrypts and optionally authenticates
the data for transport between devices.
4. On a managed switch, which feature limits the number
of incoming frames on an interface?
A) BPDU Guard
B) Storm Control
C) Loop Guard
D) Port Security
Correct Answer: D) Port Security
Rationale: Port Security can limit MAC addresses
allowed on a port and thus restrict incoming frames.
5. Which version of STP incorporates VLAN support,
allowing for a separate spanning tree for each VLAN?
A) PVST+
B) RSTP
C) MSTP
D) None of the above
Correct Answer: A) PVST+
Rationale: Per-VLAN Spanning Tree Plus (PVST+)
runs a separate instance of STP for each VLAN.
### Fill-in-the-Blank Questions
6. In routing protocols, __________ is used to prevent
routing loops by implementing a maximum hop count.
©2024/2025