CCNP Switch Ch 10 (Incomp) Flashcards
What three steps should be implemented in the network to mitigate a VLAN hopping attack? (Choose three.)
Enable DTP on all access ports.
Specify the VLAN range on trunk links.
Configure all unused ports as access ports.
Place all unused ports in the shutdown state.
Configure VLAN 1 as the native VLAN for all trunks.
Specify the VLAN range on trunk links.
Configure all unused ports as access ports.
Place all unused ports in the shutdown state.
Refer to the exhibit. The DNS servers DNS1 and DNS2 are redundant copies so they need to communicate with each other and to the Internet. The SMTP server should not be reachable from the DNS Servers. Based on the partial configuration that is provided, what private VLANs design will be implemented?
Community VLAN 202 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 100.
Isolated VLAN 202 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 100.
Community VLAN 100 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 202.
Isolated VLAN 100 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 202.
Community VLAN 202 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 100.
What can be used to mitigate MAC table flooding attacks?
DHCP snooping
private VLANs
port security
root guard
port security
In which location or situation is a private VLAN appropriate?
a DMZ segment
ISP SOHO connections
a web hosting environment at an ISP
two recently merged companies that have overlapping IP addressing schemes
a web hosting environment at an ISP
Which configuration guideline applies to using the capture option in VACL?
Capture ports transmit traffic that belongs to all VLANs.
The capture port captures all packets that are received on the port.
The switch has a restriction on the number of capture ports.
The capture port needs to be in the spanning-tree forwarding state for the VLAN.
The capture port needs to be in the spanning-tree forwarding state for the VLAN.
What IOS feature is executed with the traceroute mac command?
Layer 2 traceroute
MAC port security
Embedded Event Manager
Switched Port Analyzer
Layer 2 traceroute
Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, the servers do not have to communicate with each other although they are located on the same subnet. Both servers need to communicate with the data server that is located on the inside network. Which configuration will isolate the servers from inside attacks?
Ports Fa3/1, Fa3/2, Fa3/34, and Fa3/35 on DSW1 will be defined as primary VLAN promiscuous ports.
Ports Fa3/1, Fa3/2, Fa3/34, and Fa3/35 on DSW1 will be defined as primary VLAN community ports.
Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.
Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN community ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.
Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.
What is one way to mitigate ARP spoofing?
Enable dynamic ARP inspection.
Configure MAC address VLAN access maps.
Enable root guard.
Implement private VLANs.
Enable dynamic ARP inspection.
What are two purposes for an attacker launching a MAC table flood? (Choose two.)
to initiate a man-in-the-middle attack
to initiate a denial of service (DoS) attack
to capture data from the network
to gather network topology information
to exhaust the address space available to the DHCP
to initiate a denial of service (DoS) attack
to capture data from the network
What switchport port-security keyword causes MAC addresses to be added to the running configuration?
aging
mac-address sticky
maximum
violation
mac-address sticky
Which type of output would be produced on a switch after entering the command, Switch# show ip dhcp snooping binding?
DHCP servers on the snooped network
DHCP clients on all DHCP snooped switches on the network
DHCP clients that are connected to DHCP snooped ports on the switch
all active protocols on all DHCP clients that are connected to DHCP snooped ports on the switch
DHCP clients that are connected to DHCP snooped ports on the switch
Refer to the exhibit. After the configuration has been applied to ACSw22, frames that are bound for the node on port FastEthernet 0/1 are periodically being dropped. What should be done to correct the issue?
Add the switchport port-security mac-address sticky command to the interface configuration.
Change the port speed to speed auto with the interface configuration mode.
Use the switchport mode trunk command in the interface configuration.
Remove the switchport command from the interface configuration.
Add the switchport port-security mac-address sticky command to the interface configuration.
How should unused ports on a switch be configured in order to prevent VLAN hopping attacks?
Configure them with the UDLD feature.
Configure them with the PAgP protocol.
Configure them as trunk ports for the native VLAN 1.
Configure them as access ports and associate them with an unused VLAN.
Configure them as access ports and associate them with an unused VLAN.
Which statement describes the purpose of the configuration that is shown?
Switch(config)# ip dhcp snooping
Switch(config)# ip dhcp snooping vlan 3
Switch(config-if)# ip dhcp snooping trust
Switch(config-if)# ip dhcp snooping limit rate 30
It is meant to disable any host that is configured to be in VLAN 3.
It is meant to disable any rogue DHCP servers that are attached to VLAN 3.
It is meant to monitor VLAN 3 for DHCP attacks that will deplete the DHCP pool.
It is meant to monitor VLAN 3 and disable any hosts that are using static IP addresses rather than DHCP addresses.
It is meant to monitor VLAN 3 for DHCP attacks that will deplete the DHCP pool.
A network administrator is tasked with protecting a server farm by implementing private VLANs. Each server should only be allowed to communicate with the default gateway. Which type of pVLAN should be configured on the switch port that connects to a server?
isolated
promiscuous
community
secondary VLAN
isolated