100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CCNA 2 MODULE 1 QUIZ QUESTIONS AND ANSWERS 2025

Rating
-
Sold
-
Pages
17
Grade
A
Uploaded on
02-07-2025
Written in
2024/2025

What must an administrator have in order to reset a lost password on a router? A. physical access to the router B. a TFTP server C. a crossover cable D. access to another router - ANSWERphysical access to the router Which tasks can be accomplished by using the command history feature? (Choose two.) A. Save command lines in a log file for future reference. B. Recall previously entered commands. C. Recall up to 15 command lines by default. D. View a list of commands entered in a previous session. E. Set the command history buffer size. - ANSWERSet the command history buffer size. Recall previously entered commands. Which statement describes the system LED operation on Cisco Catalyst switches? A. If the LED is amber, the system is receiving power but it is not functioning properly.

Show more Read less
Institution
CCNA 2
Course
CCNA 2










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CCNA 2
Course
CCNA 2

Document information

Uploaded on
July 2, 2025
Number of pages
17
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CCNA 2 V7 MODULES 10 - 13: L2
SECURITY AND WLANS EXAM 100%
SOLVED 2025

,Which Layer 2 attack will result in legitimate users not getting valid IP addresses?
A. ARP spoofing
B. DHCP starvation
C. IP address spoofing
D. MAC address flooding - ANSWERB. DHCP starvation

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address
table overflow?
A. Disable DTP.
B. Disable STP.
C. Enable port security.
D. Place unused ports in an unused VLAN. - ANSWERC. Enable port security.

Which three Cisco products focus on endpoint security solutions? (Choose three.)
A. IPS Sensor Appliance
B. Web Security Appliance
C. Email Security Appliance
D. SSL/IPsec VPN Appliance
E. Adaptive Security Appliance
F. NAC Appliance - ANSWERB. Web Security Appliance
C. Email Security Appliance
F. NAC Appliance

True or False?
In the 802.1X standard, the client attempting to access the network is referred to as the
supplicant.
T. True
F. False - ANSWERT. True

Which authentication method stores usernames and passwords in the router and is
ideal for small networks?
A. server-based AAA over TACACS+
B. local AAA over RADIUS
C. server-based AAA
D. local AAA over TACACS+
E. local AAA
F. server-based AAA over RADIUS - ANSWERE. local AAA

What represents a best practice concerning discovery protocols such as CDP and LLDP
on network devices?
A. Enable CDP on edge devices, and enable LLDP on interior devices.
B. Use the open standard LLDP rather than CDP.

, C. Use the default router settings for CDP and LLDP.
D. Disable both protocols on all interfaces where they are not required. - ANSWERD.
Disable both protocols on all interfaces where they are not required.

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely
manage network devices?
A. SNMP
B. TFTP
C. SSH
D. SCP - ANSWERC. SSH

Which statement describes the behavior of a switch when the MAC address table is
full?
A. It treats frames as unknown unicast and floods all incoming frames to all ports on the
switch.
B. It treats frames as unknown unicast and floods all incoming frames to all ports across
multiple switches.
C. It treats frames as unknown unicast and floods all incoming frames to all ports within
the local VLAN.
D. It treats frames as unknown unicast and floods all incoming frames to all ports within
the collision domain. - ANSWERC. It treats frames as unknown unicast and floods all
incoming frames to all ports within the local VLAN.

What device is considered a supplicant during the 802.1X authentication process?
A. the router that is serving as the default gateway
B. the authentication server that is performing client authentication
C. the client that is requesting authentication
D. the switch that is controlling network access - ANSWERC. the client that is
requesting authentication

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP
phone and PC work properly. Which switch configuration would be most appropriate for
port Fa0/2 if the network administrator has the following goals?
No one is allowed to disconnect the IP phone or the PC and connect some other wired
device. If a different device is connected, port Fa0/2 is shut down.
The switch should automatically detect the MAC address of the IP phone and the PC
and add those addresses to the running configuration.
A. SWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security mac-
address sticky
B. SWA(config-if)# switchport port-securitySWA(config-if)# switchport port-security
maximum 2SWA(config-if)# switchport port-security mac-address stickySWA(config-if)#
switchport port-security violation restrict
C. SWA(config-if)# switchport port-security mac-address stickySWA(config-if)#
switchport por - ANSWERD. SWA(config-if)# switchport port-securitySWA(config-if)#
switchport port-security maximum 2SWA(config-if)# switchport port-security mac-
address sticky

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
papersmaster01 Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
278
Member since
2 year
Number of followers
106
Documents
14064
Last sold
6 days ago
PAPERSMASTER01

On this page you will find documents , package deals, flashcards offered by seller PAPERSMASTER01.With our documents on your side you"ll be well equipped to tackle you exams and achieve the grades you need.

3.9

71 reviews

5
22
4
33
3
9
2
3
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions