Switch Security Flashcards

1
Q

When configuring VLANs on a switch, what is used to identify VLAN membership of a device?

Switch port
MAC address
Hostname
IP address

A

Switch port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a
switch.
You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to
the network. However, employees who plug into those same jacks should be able to connect to the network.
What feature should you configure?

Spanning tree
Bonding
VLANs
Mirroring
Port authentication
A

Port authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You run a small network for your business that has a single router connected to the Internet and a single
switch. You keep sensitive documents on a computer that you would like to keep isolated from other
computers on the network. Other hosts on the network should not be able to communicate with this
computer through the switch, but you still need to access the network through the computer.
What should you use for this situation?

Port security
Spanning tree
VPN
VLAN

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You manage a single subnet with three switches. The switches are connected to provide redundant paths
between the switches.
Which feature allows the switches to pass VLAN traffic between the switches?

Bonding
Trunking
PoE
802.1x
Spanning tree
A

Trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the
switch?

Trunk ports
Gigabit and higher Ethernet ports
Any port not assigned to a VLAN
Uplink ports
Each port can only be a member of a single VLAN
A

Trunk ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You manage a network with two switches. The switches are connected together through their Gigabit
Ethernet uplink ports.
You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate
with a device on the second switch also in VLAN 1.
What should you configure to allow communication between these two devices through the switches?

Bonding
Layer 3 switching
Trunking
Spanning tree

A

Trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of device is required to implement port authentication through a switch?

RADIUS server
Layer 3 switch
Proxy server
Router

A

RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following connectivity hardware is used to create a VLAN?

Switch
Hub
Router
Bridge

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your company is a small start-up company that has leased office space in a building shared by other
businesses. All businesses share a common network infrastructure. A single switch connects all devices in the
building to the router that provides Internet access.
You would like to make sure that your computers are isolated from computers used by other companies.
Which feature should you request to have implemented?

VLAN
VPN
Port security
Spanning tree

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You manage a network that uses a single switch. All ports within your building connect through the single
switch.
In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug
into these ports to gain Internet access, but they should not have access to any other devices on your private
network. Employees connected throughout the rest of your building should have both private and Internet
access.
Which feature should you implement?

Port authentication
PoE
Spanning tree
VLANs

A

VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which switch features are typically used with VoIP? (Select two.)
Mirroring
Spanning tree
VLAN
PoE
A

VLAN

PoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best describes the concept of a virtual LAN?

Devices connected through the Internet that can communicate without using a network address
Devices on different networks that can receive multicast packets
Devices on the same network logically grouped as if they were on separate networks
Devices in separate networks (i.e. different network addresses) logically grouped as if they were in the
same network
Devices connected by a transmission medium other than cable (i.e. microwave, radio transmissions)

A

Devices on the same network logically grouped as if they were on separate networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following do switches and wireless access points use to control access through the device?
Port number filtering
IP address filtering
Session filtering
MAC filtering
A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You manage a network with two switches. The switches are connected together through their Gigabit
Ethernet uplink ports.
You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate
with a device on the same switch which is in VLAN 2.
What should you configure so that the two devices can communicate?

Mirroring
Trunking
Spanning tree
PoE
Routing
A

Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly