Day 49 Back to Exams Page 1. RADIUS stands for ___.RADIUS Authentication Dial-In User ServiceRemote Authorization Dial-In User ServiceRemote Authentication Dial-In User ServiceRemote Accounting Dial-In User ServiceQuestion 1 of 16 2. You can remotely configure or shut down ports and devices using SNMP.TrueFalseQuestion 2 of 16 3. You can turn off console logging messages with the ______ command.disable logging consoleno loggingno consoleno logging consoleQuestion 3 of 16 4. In order to re-activate an err-disabled interface, manual intervention is necessary via issuing the shutdown and no shutdown commands on the interface.TrueFalseQuestion 4 of 16 5. Which switchport security mode does NOT send a syslog message?ProtectRestrictProtectQuestion 5 of 16 6. It is very important to remember that when enabling port security on an interface that is also configured with a voice VLAN in conjunction with the data VLAN, the maximum allowed secure addresses on the port should be set to __.1234Question 6 of 16 7. Once port security has been enabled, administrators can define the actions the switch will take in the event of a port security violation. Cisco IOS software allows administrators to specify four different actions to take when a violation occurs, as follows:ShutdownProtectRestrictShutdown VLANCloseOpenQuestion 7 of 16 8. The primary objective of MAC spoofing is to confuse the switch and cause it to believe that the same host is connected to two ports, which causes the switch to attempt to forward frames destined to the trusted host to the attacker as well.TrueFalseQuestion 8 of 16 9. Dynamically learned contents of the switch CAM table, or MAC address table, can be viewed by issuing the show mac-address-table _____ command.autoarpdynamicreverseQuestion 9 of 16 10. You should shut down every port that is not used on routers, switches, and other network devices.TrueFalseQuestion 10 of 16 11. you can issue a service password-encryption command on your router, but this only offers weak (level _) encryption.1357Question 11 of 16 12. An AV pair is simply a secured network object comprised of an attribute, such as a username or password, and a value for that particular attribute.TrueFalseQuestion 12 of 16 13. The best method to secure a program is not to attempt to add security after the functionality but to consider security as a component of the development process.TrueFalseQuestion 13 of 16 14. ____ is a vital first step in building a secure network services infrastructure.UpgradingAuditingHardeningCappingQuestion 14 of 16 15. A successful bluesnarfing attack, especially against older Bluetooth technology, does not necessarily require any user action.TrueFalseQuestion 15 of 16 16. Spam instant messages, sometimes known as ___, are often used in phishing attacks.spimmersmspmspimQuestion 16 of 16 Loading...