Chapter 7 - Network Pro

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following BEST describes Ethernet flow control?

A configuration that sends a pause frame to the transmitting device when the receiving device cannot keep up with the volume of data being sent.

You are configuring a switch so that you can manage it using PuTTY from the same network segment. On the switch, you enter the following commands: switch#config terminalswitch(config)#interface vlan 1switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work?

No. The no shutdown command needs to be entered.

Which of the following is the protocol used for address resolution when you switch from IPv4 to IPv6?

NDP

Your organization's management wants to monitor all the customer services calls. The calls are taken on VoIP phones. Which of the following configurations would BEST help you set up a way to monitor the calls?

Port mirroring

Which statements accurately describe the port states of both bridges and switches? (Select two.)

Ports in a blocked state still receive BPDUs. In the learning state, the MAC address table can be populated, but frames are not forwarded.

Which of the following switch features allows you to configure how the switch's MAC address table is filled?

Port security

For which of the following devices does a voice VLAN prioritize traffic?

VoIP phone

Which of the following is a method of VLAN hopping?

Double tagging

In which type of device is a MAC address table stored?

Switch

Which of the following is the open standard for tagging Layer 2 frames?

802.1q

Which of the following must each device's MTU be set to for jumbo frames to transverse the network without risk of fragmentation?

9,000

What does the ip address dhcp command allow you to do?

Configure a switch to obtain an IP address from a DHCP server.

Drag each description on the left to the appropriate switch attack type on the right.

ARP spoofing/poisoning - The source device sends frames to the attacker's MAC address instead of to the correct device. Dynamic Trunking Protocol - Should be disabled on the switch's end user (access) ports before implementing the switch configuration in to the network. MAC flooding - Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode. MAC spoofing - Can be used to hide the identity of the attacker's computer or impersonate another device on the network.

Which of the following BEST describes an ARP spoofing attack?

An attack that associates an attacker's MAC address with the IP address of a victim's device.

Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device?

CSMA/CD

Computers A and B are on the same VLAN and are separated by two switches as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following BEST describes the frame's composition as it travels from A to B?

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge?

Configure a priority number of 4096 for switch C.

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that's connected to the library network through an access port on a switch. You want to restrict access to the network so that only library computers are permitted connectivity to the internet. What can you do?

Configure port security on the switch.

Which of the following scenarios would typically utilize 802.1x authentication?

Controlling access through a switch.

Which level of the OSI model does a Layer 2 switch operate at?

Data Link layer

Which of the following is a device that can send and receive data simultaneously?

Full-duplex

Which command would you use on a switch to enable management from a remote network?

IP default-gateway 192.168.10.185

Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.

In-Band Management- Competes with normal network traffic for bandwidth. -Must be encrypted to protect communications from sniffing. -Affected by network outages. Out-of-band management -Uses a dedicated communication channel. -Does not compete with normal network traffic for bandwidth.

Which of the following is true about an unmanaged switch?

It is capable of VLAN creation.

As a network administrator, you have 10 VLANs on your network that need to communicate with each other. Which of the following network devices is the BEST choice for allowing communication between 10 VLANs?

Layer 3 switch

On your network, you have a VLAN for the sales staff and a VLAN for the production staff. Both need to be able to communicate over the network. Which of the following devices would work BEST for communication between VLANs?

Layer 3 switch

An attacker hides his computer's identity by impersonating another device on a network. Which of the following attacks did the attacker MOST likely perform?

MAC spoofing attack

Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all.

Managed Switch -Provide port security features.-Support VLANs. -Can be configured over a network connection. -Can be configured over a dedicated communication channel. Unmanaged switch- Commonly sold at retail stores. -Provide very few configuration options.

Which of the following BEST describes port aggregation?

Multiple ports linked together and used as a single logical port.

Which of the following is required to establish a new network switch and configure its IP address for the first time?

Out-of-band management

Which of the following methods is best to have when a network goes down?

Out-of-band management

You have a large Power over Ethernet flat screen that you are installing in a conference room that requires 70 watts of power. Which of the following IEEE standards does your PoE switch need to provide power for the flat screen?

PoE++ Type 4

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature prevents switching loops and ensures that there is only a single active path between any two switches?

Spanning Tree

Which of the following is a communication device that connects other network devices through cables and receives and forwards data to a specified destination within a LAN?

Switch

Which of the following switch attacks bypasses the normal functions of a router to communicate between VLANs and gain unauthorized access to traffic on another VLAN?

Switch spoofing

A switch receives a frame with a destination MAC address that is not found in its MAC address table. What happens next?

The frame is replicated and sent to every active port on the switch except the source port.

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in VLAN 1. What should you configure to allow communication between these two devices through the switches?

Trunking

You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network?

Two

Listen to exam instructions You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. Which of the following should you use in this situation?

VLAN

Which of the following attacks manipulates a switch's auto-negotiation setting to access a virtual local area network that's connected to the same switch as the attacker's virtual local area network?

VLAN spoofing


Conjuntos de estudio relacionados

C795 - Cybersecurity Management II - Tactical | Pre-Assessment

View Set

PATHO MIDTERM CH. 10, 11, 13, 14, 15

View Set