Live Virtual Machine Lab 11.1: Module 11 Networking Hardening Techniques and Best Practices
You have empty ports on your switches, that is, no connected hosts. Which of the following are best practices to ensure that the empty ports are secure?
Move the ports from the default VLAN to a new, unused VLAN and then disable them
You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?
Create Private VLANs
You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?
Host A traffic will be denied because, at the end of every access list, there is an implicit deny statement
Which of the following versions of SNMP are considered unsecure? [Choose all that apply]
SNMPv1 and SNMPv2c
You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which of the following enabled feature on the switch can cause this issue?
DHCP Snooping