CCNP Switch Ch 10 (Incomp) Flashcards

1
Q

What three steps should be implemented in the network to mitigate a VLAN hopping attack? (Choose three.)

Enable DTP on all access ports.

Specify the VLAN range on trunk links.

Configure all unused ports as access ports.

Place all unused ports in the shutdown state.

Configure VLAN 1 as the native VLAN for all trunks.

A

Specify the VLAN range on trunk links.

Configure all unused ports as access ports.

Place all unused ports in the shutdown state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refer to the exhibit. The DNS servers DNS1 and DNS2 are redundant copies so they need to communicate with each other and to the Internet. The SMTP server should not be reachable from the DNS Servers. Based on the partial configuration that is provided, what private VLANs design will be implemented?

Community VLAN 202 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 100.

Isolated VLAN 202 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 100.

Community VLAN 100 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 202.

Isolated VLAN 100 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 202.

A

Community VLAN 202 will be created to host both DNS servers, and this VLAN will be associated with the primary VLAN 100.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can be used to mitigate MAC table flooding attacks?

DHCP snooping

private VLANs

port security

root guard

A

port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In which location or situation is a private VLAN appropriate?

a DMZ segment

ISP SOHO connections

a web hosting environment at an ISP

two recently merged companies that have overlapping IP addressing schemes

A

a web hosting environment at an ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which configuration guideline applies to using the capture option in VACL?

Capture ports transmit traffic that belongs to all VLANs.

The capture port captures all packets that are received on the port.

The switch has a restriction on the number of capture ports.

The capture port needs to be in the spanning-tree forwarding state for the VLAN.

A

The capture port needs to be in the spanning-tree forwarding state for the VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What IOS feature is executed with the traceroute mac command?

Layer 2 traceroute

MAC port security

Embedded Event Manager

Switched Port Analyzer

A

Layer 2 traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, the servers do not have to communicate with each other although they are located on the same subnet. Both servers need to communicate with the data server that is located on the inside network. Which configuration will isolate the servers from inside attacks?

Ports Fa3/1, Fa3/2, Fa3/34, and Fa3/35 on DSW1 will be defined as primary VLAN promiscuous ports.

Ports Fa3/1, Fa3/2, Fa3/34, and Fa3/35 on DSW1 will be defined as primary VLAN community ports.

Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.

Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN community ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.

A

Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is one way to mitigate ARP spoofing?

Enable dynamic ARP inspection.

Configure MAC address VLAN access maps.

Enable root guard.

Implement private VLANs.

A

Enable dynamic ARP inspection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two purposes for an attacker launching a MAC table flood? (Choose two.)

to initiate a man-in-the-middle attack

to initiate a denial of service (DoS) attack

to capture data from the network

to gather network topology information

to exhaust the address space available to the DHCP

A

to initiate a denial of service (DoS) attack

to capture data from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What switchport port-security keyword causes MAC addresses to be added to the running configuration?

aging

mac-address sticky

maximum

violation

A

mac-address sticky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of output would be produced on a switch after entering the command, Switch# show ip dhcp snooping binding?

DHCP servers on the snooped network

DHCP clients on all DHCP snooped switches on the network

DHCP clients that are connected to DHCP snooped ports on the switch

all active protocols on all DHCP clients that are connected to DHCP snooped ports on the switch

A

DHCP clients that are connected to DHCP snooped ports on the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refer to the exhibit. After the configuration has been applied to ACSw22, frames that are bound for the node on port FastEthernet 0/1 are periodically being dropped. What should be done to correct the issue?

Add the switchport port-security mac-address sticky command to the interface configuration.

Change the port speed to speed auto with the interface configuration mode.

Use the switchport mode trunk command in the interface configuration.

Remove the switchport command from the interface configuration.

A

Add the switchport port-security mac-address sticky command to the interface configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How should unused ports on a switch be configured in order to prevent VLAN hopping attacks?

Configure them with the UDLD feature.

Configure them with the PAgP protocol.

Configure them as trunk ports for the native VLAN 1.

Configure them as access ports and associate them with an unused VLAN.

A

Configure them as access ports and associate them with an unused VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which statement describes the purpose of the configuration that is shown?

Switch(config)# ip dhcp snooping
Switch(config)# ip dhcp snooping vlan 3
Switch(config-if)# ip dhcp snooping trust
Switch(config-if)# ip dhcp snooping limit rate 30

It is meant to disable any host that is configured to be in VLAN 3.

It is meant to disable any rogue DHCP servers that are attached to VLAN 3.

It is meant to monitor VLAN 3 for DHCP attacks that will deplete the DHCP pool.

It is meant to monitor VLAN 3 and disable any hosts that are using static IP addresses rather than DHCP addresses.

A

It is meant to monitor VLAN 3 for DHCP attacks that will deplete the DHCP pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network administrator is tasked with protecting a server farm by implementing private VLANs. Each server should only be allowed to communicate with the default gateway. Which type of pVLAN should be configured on the switch port that connects to a server?

isolated

promiscuous

community

secondary VLAN

A

isolated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is one way to mitigate spanning-tree compromises?

Statically configure the primary and backup root bridge.

Implement private VLANs.

Place all unused ports into a common VLAN (not VLAN 1).

Configure MAC address VLAN access maps.

A

Statically configure the primary and backup root bridge.

17
Q

A network administrator is tasked with protecting a server farm by implementing private VLANs (PVLANs). A server is only allowed to communicate with its default gateway and other related servers. Which type of PVLAN should be configured on the switch ports that connect to the servers?

isolated

promiscuous

secondary VLAN

community

A

community

18
Q

How does MAC address flooding cause a vulnerability in the network?

The CAM table will be full, causing legitimate frames to be forwarded out all ports within the VLAN and allowing unauthorized users to capture data.

An attacking device can send or receive packets on various VLANs and bypass Layer 3 security measures.

An attacking device can exhaust the address space available to the DHCP servers for a period of time or establish itself as a DHCP server in man-in-the-middle attacks.

Information that is sent through CDP is transmitted in clear text and is unauthenticated, allowing it to be captured and to divulge network topology information.

A

The CAM table will be full, causing legitimate frames to be forwarded out all ports within the VLAN and allowing unauthorized users to capture data.

19
Q

How does VLAN hopping cause a vulnerability in the network?

The CAM table will be full, causing legitimate frames to be forwarded out all ports and allowing unauthorized users to capture data.

An attacking device can send or receive packets on various VLANs and bypass Layer 3 security measures.

An attacking device can exhaust the address space available to the DHCP servers for a period of time or establish itself as a DHCP server in man-in-the-middle attacks.

Information sent through CDP is transmitted in clear text and is unauthenticated, allowing it to be captured and to divulge network topology information.

A

An attacking device can send or receive packets on various VLANs and bypass Layer 3 security measures.

20
Q

Refer to the exhibit. A network engineer is securing a network against DHCP spoofing attacks. On all switches, the engineer applied the ip dhcp snoopingcommand and enabled DHCP snooping on all VLANs with the ip dhcp snooping vlan command. What additional step should be taken to configure the security required on the network?

Issue the ip dhcp snooping trust command on all uplink interfaces on SW1, SW2 and SW3.

Issue the ip dhcp snooping trust command on all interfaces on SW2 and SW3.

Issue the ip dhcp snooping trust command on all interfaces on SW1, SW2, and SW3.

Issue the ip dhcp snooping trust command on all interfaces on SW1, SW2, and SW3 except interface Fa0/1 on SW1.

A

Issue the ip dhcp snooping trust command on all uplink interfaces on SW1, SW2 and SW3.