Chapter 11 Switch Security Concepts
On what switch ports should PortFast be enabled to enhance STP stability?
All end-user ports
What is a recommended best practice when dealing with the native VLAN?
Assign it to an unused VLAN.
What is the best way to prevent a VLAN hopping attack?
Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.
Which procedure is recommended to mitigate the chances of ARP spoofing?
Enable DHCP snooping on selected VLANs.
An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?
Issue the shutdown command followed by the no shutdown command on the interface.
Which security feature should be enabled in order to prevent an attacker from overflowing the MAC address table of a switch?
Port security
Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.)
Port security, DHCP snooping
Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command?
RAM
Which two commands can be used to enable PortFast on a switch? (Choose two.)
S1(config-if)# spanning-tree portfast, S1(config)# spanning-tree portfast default
A network administrator is configuring DAI on a switch with the command ip arp inspection validate dst-mac. What is the purpose of this configuration command?
To check the destination MAC address in the Ethernet header against the target MAC address in the ARP body
What are two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks? (Choose two.)
Untrusted port, Trusted DHCP port
What Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol?
VLAN hopping
A network administrator is configuring DAI on a switch. Which command should be used on the uplink interface that connects to a router?
ip arp inspection trust
A network administrator is configuring DHCP snooping on a switch. Which configuration command should be used first?
ip dhcp snooping
Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco?
shutdown