10-13 Flashcards
Which authentication method stores usernames and passwords in the router and is ideal for small networks?
local AAA
What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)
- TACACS+
- RADIUS
What is the result of a DHCP starvation attack?
Legitimate clients are unable to lease IP addresses.
What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?
Disable both protocols on all interfaces where they are not required.
Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?
SSH
Which statement describes the behavior of a switch when the MAC address table is full?
It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.
Which feature on a switch makes it vulnerable to VLAN hopping attacks?
the automatic trunking port feature enabled for all ports by default
Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?
the native VLAN of the trunking port being the same as a user VLAN
Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?
authorization
Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?
accounting
What device is considered a supplicant during the 802.1X authentication process?
the client that is requesting authentication
Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?
The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.
Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?
No one is allowed to disconnect the IP phone or the PC and connect some other wired device.
If a different device is connected, port Fa0/2 is shut down.
The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running configuration.
SWA(config-if)# switchport port-security
SWA(config-if)# switchport port-security maximum 2
SWA(config-if)# switchport port-security mac-address sticky
Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?
Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.
A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?
protect
What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?
preventing rogue switches from being added to the network
Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?
VLAN double-tagging
Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?
7
An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?
shutdown
A network administrator enters the following commands on the switch SW1.
SW1(config)# interface range fa0/5 – 10
SW1(config-if)# ip dhcp snooping limit rate 6
What is the effect after these commands are entered?
FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second.
A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac . What is the purpose of this configuration command?
It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.
Which two commands can be used to enable BPDU guard on a switch? (Choose two.)
- S1(config-if)# spanning-tree bpduguard enable
- S1(config)# spanning-tree portfast bpduguard default
As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?
sticky secure MAC addresses
Which type of management frame may regularly be broadcast by an AP?
beacon
What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?
omnidirectional
What is an advantage of SSID cloaking?
Clients will have to manually identify the SSID to connect to the network.
What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)
- transmitting a probe request
- receiving a broadcast beacon frame
Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?
infrastructure
What is a wireless security mode that requires a RADIUS server to authenticate wireless users?
enterprise