.homeworkminutes.com/question/view/230289/ICT-Chapter-6-Worksheet”>ICT Chapter 6 Worksheet
1.
True or False. It is not important to secure the
end devices that reside on the network.
2.
Layer 2 security configurations include enabling
______________, ____________, _____________, and _______________.
3.
What security solutions can protect endpoints in
a borderless network?
4.
Endpoints are susceptible
to data theft. What can we do to protect these resources?
5.
_____________ provides a
variety of security-related resources which are now being integrated into Cisco
products.
6.
List and describe some main features and
benefits of Cisco Email Security solutions.
7.
The ______________ is a mitigation technology
for web-based threats that helps organizations address the growing challenges
of securing and controlling web traffic.
8.
What is the purpose of Network Admission
Control?
9.
What does a CAM table do?
10.
What is the most effective method to prevent CAM
table overflow attacks?
11.
What is a VLAN hopping attack and how can you
protect a network from these types of attacks?
12.
How do you enable the PVLAN Edge feature on a
Cisco switch?
13.
There are three types of PVLAN ports. List and
describe each type.
14.
______________ attacks can be mitigated using
DHCP snooping on trusted ports.
15.
To prevent _______________ or poisoning, a
switch must ensure that only valid ARP requests and replies are relayed.
16.
What is PortFast?
17.
What is BPDU Guard?
18.
What is Root Guard?
19.
What is Loop Guard?