Dset udld enable

8. What are the three types of private VLAN ports?

a. Neighborhood, remote, and loose b. Community, isolated, and promiscuous c. Communal, remote, and licentious d. Area, secluded, and wanton

9. What common tool is used to launch MAC overflow attacks?

a. Dsniff b. Macof c. Arpspoof d. Tablstuf

10. Protect mode security is recommended for trunk ports.

11. What are the three factors when designing a Layer 2 protected network?

a. Number of users groups b. Number of DNS zones c. Number of switches d. Number of buildings e. Number of security zones

The answers to the "Do I Know This Already?" quiz are found in the appendix. The suggested choices for your next step are as follows:

• 9 or less overall score Read the entire chapter. This includes the "Foundation Topics" and "Foundation Summary" sections and the "Q&A" section.

• 10 or 11 overall score If you want more review on these topics, skip to the "Foundation Summary" section and then go to the "Q&A" section. Otherwise, move on to Chapter 15, "Context-Based Access Control."


0 0

Post a comment