Question # 1:
Which three options are types of Layer 2 network attacks? (Choose three.)
A. botnet attacks
B. spoofing attacks
C. brute force attacks
D. DOS attacks
E. VLAN hooping
F. ARP attacks
Answer: B E F
Question # 2:
Which command should you enter to configure a single port to prevent alternate ports from becoming designated ports?
A, Spanning-tree guard loop
B. Spanning-tree loopguard default
C. Spanning-tree guard root
Question # 3:
Which command do you enter to enable an interface to support PPPoE on a client?
A. Dev1(config)# bba-group pppoe bba1
B. Dev1(config-if)# pppoe-client dial-pool-number1
C. Dev1(config-if)# pppoe enable group bba1
D. Dev1(config-if)# pppoe enable
Question # 4:
You have configured the host computers on a campus LAN to receive their DHCP addresses from the local router to be able to browse their corporate site. Which statement about the network environment is true?
A. It supports a DNS server for use by DHCP clients.
B. Two host computers may be assigned the same IP address.
C. The DNS server mustbe configured manually on each host.
D. The domain name must be configured locally on each host computer.
Question # 5:
Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three)
Answer: A C D