11.1_Impelement Port Security Flashcards
___are considered to be the weakest link in a company’s security infrastructure.
Layer 2 devices
A simple method that many administrators use to help secure the network from unauthorized access is to _____
disable all unused ports on a switch
to disable a port
shutdown
to enable a port
no shutdown
to configure a range or ports
interface range TYPE MODULE/FIRST-NUMBER–LAST NUMBER
The simplest and most effective method to prevent MAC address table overflow attacks is to enable ___.
port security
When a port configured with port security receives a frame, the source MAC address of the frame is compared to the list of secure source MAC addresses that were manually configured or dynamically learned on the port.
Port security limits the number of ___allowed on a port.
valid MAC addresses
To set the maximum number of MAC addresses allowed on a port, use the command __
switchport port-security maximum VALUE
The default port security value is___
1
TRUE OR FALSE
The maximum number of secure MAC addresses that can be configured is fixed.
FALSE
It depends the switch and the IOS.
3 WAYS FOR MAC LEARNING
1. ____
The administrator manually configures a static MAC address(es) by using the following command for each secure MAC address on the port:____
Manually Configured
switchport port-security mac-address MAC-ADDRESS
3 WAYS FOR MAC LEARNING
2. ____
When the ___ command is entered, the current source MAC for the device connected to the port is automatically secured but is not added to the startup configuration. If the switch is rebooted, the port will have to re-learn the device’s MAC address.
Dynamically Learned
switchport port-security
3 WAYS FOR MAC LEARNING
3. ____
The administrator can enable the switch to dynamically learn the MAC address and “stick” them to the running configuration by using the following command:____
Dynamically Learned – Sticky
switchport port-security mac-address sticky
The output of the ___command lists the two learned MAC addresses.
show port-security address
____can be used to set the aging time for static and dynamic secure addresses on a port.
Port security aging