Securing Layer 2 Technologies Flashcards

1
Q

Which is the primary Layer 2 mechanism that allows multiple devices in the same VLAN to communicate with each other even though those devices are physically connected to different switches?

A

Trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a switch know about parallel Layer 2 paths?

A

BPDU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When implemented, what helps prevent CAM table overflow?

A

Port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When it comes to VLANs, what is considered not a best practice?

A

Leaving the native VLAN as VLAN 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the default number of MAC address allowed on a switch port that is configured with port security?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two items that normally have a one-to-one correlation?

A

VLANs, IP subnetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a typical method used by a device in one VLAN to reach another device in a second VLAN?

A

Use a local default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two configuration changes that prevent users from jumping on to any VLAN they want?

A

Disabling negotiation of trunk ports, Configuring the port connecting to the client as an access port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If you limit the number of MAC addresses learned on a port to five, what benefits fo you get from the port security feature?

A

Protection for DHCP servers against starvation, Protection against MAC address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why should you implement Root Guard on a switch?

A

To prevent the switch from having specific root ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why should CDP be disabled on ports that face untrusted networks?

A

CDP can be used as a DDoS vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name three true statements for DHCP snooping.

A

DHCP snooping validates DHCP messages received from untrusted sources and filters out invalid messages, DHCP snooping information is stored in a binding database, DHCP snooping rate-limits DHCP traffic from trusted and untrusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name three true statements regarding dynamic ARP inspection (DAI).

A

DAI intercepts, logs, and discards ARP packets with invalid packets with IP-to-MAC address bindings, DAI helps to mitigate MITM attacks, DAI determines validity of ARP packets based on IP-to-MAC address bindings found in the DHCP snooping database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly