1_Switch Management Flashcards

1
Q

What is the primary function of a Layer 2 switch?

A

It forwards data based on MAC addresses at the Data Link Layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the main steps in a switch’s boot sequence?

A

1) POST.

2) Boot loader initialization.

3) Flash file system setup.

4) Load IOS image.

5) Initialize interfaces using startup configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a MAC address and an IP address?

A
  • MAC: Physical, unchanging, factory-assigned.
  • IP: Logical, location-based, assigned by the network administrator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a CAM table?

A

A table in a switch that stores MAC addresses and their associated ports to speed up data forwarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is SSH preferred over Telnet?

A

SSH provides encrypted communication, making it secure, while Telnet transmits data in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three port security violation modes?

A

1) Protect: Drops unauthorized packets silently.

2) Restrict: Drops unauthorized packets and logs the violation.

3) Shutdown: Disables the port upon a violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DHCP spoofing?

A

It’s an attack where a fake DHCP server assigns incorrect IP addresses to devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which command enables port security on a switch interface?

A

switchport port-security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens during a MAC address flooding attack?

A

The CAM table is overwhelmed with bogus MAC addresses, causing the switch to act like a hub and broadcast all traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you secure unused switch ports?

A

Disable them using the shutdown command on the unused interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which TCP ports are used by Telnet and SSH?

A

Telnet: Port 23.

SSH: Port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the command copy run start do?

A

Saves the running configuration to the startup configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name three best practices for securing a switch.

A

1) Use strong passwords and update them frequently.

2) Disable unused ports.

3) Replace Telnet with SSH for remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is MDIX, and why is it important?

A
  • MDIX (Medium Dependent Interface Crossover) automatically configures the connection type, eliminating the need for specific cable types (straight-through or crossover).
  • Requires speed and duplex to be set to auto for functionality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ARP, and how does it work?

A

ARP maps an IP address to a MAC address.

Process:

1) Host broadcasts an ARP request for a specific IP.

2) Only the host with the matching IP responds with its MAC address.

3) The MAC address is then used to send frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are potential threats to switches, and how do they work?

A

MAC Address Flooding:Overloads the CAM table with bogus MAC addresses.Forces the switch to act as a hub, broadcasting all frames.Exploited to intercept traffic.

DHCP Spoofing:Attacker introduces a fake DHCP server.Assigns incorrect IP addresses, redirecting traffic to the attacker.

Telnet Vulnerabilities:Exploits unencrypted Telnet sessions to brute force passwords or launch denial-of-service attacks.

17
Q

Why is NTP important in switch management?

A

It synchronizes time across devices for accurate logging and monitoring.