1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is a recommended best practice when dealing with the native VLAN?
a. Turn off DTP.
b. Use port security.
c. Assign it to an unused VLAN.
d. Assign the same VLAN number as the management VLAN.
c. Assign it to an unused VLAN.
On what switch ports should PortFast be enabled to enhance STP stability?
a. All end-user ports
b. Only ports that attach to a neighboring switch
c. All trunk ports that are not root ports
d. Only ports that are elected as designated ports
a. All end-user ports
Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco?
a. shutdown
b. ip dhcp snooping
c. switchport port-security mac-address sticky
d. switchport port-security violation shutdown
e. switchport port-security mac-address sticky mac-address
a. shutdown
Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.)
a. Port security
b. Extended ACL
c. DHCP snooping
d. DHCP server failover
e. Strong password on DHCP servers
a. Port security
c. DHCP snooping
What is the best way to prevent a VLAN hopping attack?
a. Disable STP on all nontrunk ports.
b. Use ISL encapsulation on all trunk links.
c. Use VLAN 1 as the native VLAN on trunk ports.
d. Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.
d. Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.
Which procedure is recommended to mitigate the chances of ARP spoofing?
a. Enable port security globally.
b. Enable DHCP snooping on selected VLANs.
c. Enable DAI on the management VLAN.
d. Enable IP Source Guard on trusted ports.
b. Enable DHCP snooping on selected VLANs.
What are two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks? (Choose two.)
a. Unknown port
b. Untrusted port
c. Unauthorized port
d. Trusted DHCP port
e. Authorized DHCP port
f. Established DHCP port
b. Untrusted port
d. Trusted DHCP port
Which two commands can be used to enable PortFast on a switch? (Choose two.)
a. S1(config-if)# spanning-tree portfast
b. S1(config-line)# spanning-tree portfast
c. S1(config)# spanning-tree portfast default
d. S1(config-if)# enable spanning-tree portfast
e. S1(config)# enable spanning-tree portfast default
a. S1(config-if)# spanning-tree portfast
c. S1(config)# spanning-tree portfast default
An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?
a. Reboot the switch.
b. Issue the shutdown command followed by the no shutdown command on the interface.
c. Issue the no switchport port-security command, then re-enable port security.
d. Issue the no switchport port-security violation shutdown command on the interface.
b. Issue the shutdown command followed by the no shutdown command on the interface.
A network administrator is configuring DHCP snooping on a switch. Which configuration command should be used first?
a. ip dhcp snooping
b. ip dhcp snooping vlan
c. ip dhcp snooping trust
d. ip dhcp snooping limit rate
a. ip dhcp snooping
A network administrator is configuring DAI on a switch with the command ip arp inspection validate dst-mac. What is the purpose of this configuration command?
a. To check the destination MAC address in the Ethernet header against the MAC address table
b. To check the destination MAC address in the Ethernet header against the user-configured ARP ACLs
c. To check the destination MAC address in the Ethernet header against the target MAC address in the ARP body
d. To check the destination MAC address in the Ethernet header against the source MAC address in the ARP body
c. To check the destination MAC address in the Ethernet header against the target MAC address in the ARP body
Which security feature should be enabled in order to prevent an attacker from overflowing the MAC address table of a switch?
a. BPDU filter
b. Port security
c. Storm control
d. Root guard
b. Port security
What Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol?
a. VLAN hopping
b. DHCP spoofing
c. ARP poisoning
d. ARP spoofing
a. VLAN hopping
A network administrator is configuring DAI on a switch. Which command should be used on the uplink interface that connects to a router?
a. ip arp inspection vlan
b. ip arp inspection trust
c. ip dhcp snooping
d. spanning-tree portfast
b. ip arp inspection trust
Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command?
a. ROM
b. RAM
c. NVRAM
d. Flash
b. RAM