CCNA Security - Chapter 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

snooping

DHCP ________ is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters.

- by using a proxy autoconfiguration file in the end device

How can a user connect to the Cisco Cloud Web Security service directly? - through the connector that is integrated into any Layer 2 Cisco switch - by using a proxy autoconfiguration file in the end device - by accessing a Cisco CWS server before visiting the destination web site - by establishing a VPN connection with the Cisco CWS

- on all switch ports that connect to another switch that is not the root bridge

In what situation would a network administrator most likely implement root guard? - on all switch ports (used or unused) - on all switch ports that connect to a Layer 3 device - on all switch ports that connect to host devices - on all switch ports that connect to another switch - on all switch ports that connect to another switch that is not the root bridge

- The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.

Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown? - The connection between S1 and PC1 is via a crossover cable. - The Fa0/24 interface of S1 is configured with the same MAC address as the Fa0/2 interface. - S1 has been configured with a switchport port-security aging command. - The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.

- PVLAN Edge

Two devices that are connected to the same switch need to be totally isolated from one another. Which Cisco switch security feature will provide this isolation? - PVLAN Edge - DTP - SPAN - BPDU guard

- DHCP snooping

What additional security measure must be enabled along with IP Source Guard to protect against address spoofing? - port security - BPDU Guard - root guard - DHCP snooping

- Set the native VLAN to an unused VLAN. - Disable DTP. - Enable trunking manually.

What are three techniques for mitigating VLAN hopping attacks? (Choose three.) - Set the native VLAN to an unused VLAN. - Disable DTP. - Enable Source Guard. - Enable trunking manually. - Enable BPDU guard. - Use private VLANs.

- Cisco NAC Agent

What component of Cisco NAC is responsible for performing deep inspection of device security profiles? - Cisco NAC Profiler - Cisco NAC Agent - Cisco NAC Manager - Cisco NAC Server

- The switch will forward all received frames to all other ports.

What is the behavior of a switch as a result of a successful CAM table attack? - The switch will forward all received frames to all other ports. - The switch will drop all received frames. - The switch interfaces will transition to the error-disabled state. - The switch will shut down.

- a promiscuous port

What is the only type of port that an isolated port can forward traffic to on a private VLAN? - a community port - a promiscuous port - another isolated port - any access port in the same PVLAN

- It provides the ability for creation and reporting of guest accounts.

What is the role of the Cisco NAC Guest Server within the Cisco Borderless Network architecture? - It defines role-based user access and endpoint security policies. - It provides the ability for creation and reporting of guest accounts. - It provides post-connection monitoring of all endpoint devices. - It performs deep inspection of device security profiles.

- to define role-based user access and endpoint security policies

What is the role of the Cisco NAC Manager in implementing a secure networking infrastructure? - to define role-based user access and endpoint security policies - to assess and enforce security policy compliance in the NAC environment - to perform deep inspection of device security profiles - to provide post-connection monitoring of all endpoint devices

- assessing and enforcing security policy compliance in the NAC environment

What is the role of the Cisco NAC Server within the Cisco Secure Borderless Network Architecture? - providing the ability for company employees to create guest accounts - providing post-connection monitoring of all endpoint devices - defining role-based user access and endpoint security policies - assessing and enforcing security policy compliance in the NAC environment

- DHCP starvation

What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease? - DHCP spoofing - CAM table attack - IP address spoofing - DHCP starvation

- DTP

What protocol should be disabled to help mitigate VLAN hopping attacks? - STP - ARP - CDP - DTP

- preventing rogue switches from being added to the network

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces? - enforcing the placement of root bridges - preventing buffer overflow attacks - preventing rogue switches from being added to the network - protecting against Layer 2 loops

- port security

What security countermeasure is effective for preventing CAM table overflow attacks? - DHCP snooping - Dynamic ARP Inspection - IP source guard - port security

- MAC-address-to-IP-address bindings - ARP ACLs

What two mechanisms are used by Dynamic ARP inspection to validate ARP packets for IP addresses that are dynamically assigned or IP addresses that are static? (Choose two.) - MAC-address-to-IP-address bindings - RARP - ARP ACLs - IP ACLs - Source Guard

- root guard

Which STP stability mechanism is used to prevent a rogue switch from becoming the root switch? - Source Guard - BPDU guard - root guard - loop guard

- file retrospection

Which feature is part of the Antimalware Protection security solution? - file retrospection - user authentication and authorization - data loss prevention - spam blocking

- implementing port security

Which mitigation technique would prevent rogue servers from providing false IP configuration parameters to clients? - turning on DHCP snooping - implementing port security - implementing port-security on edge ports - disabling CDP on edge ports

+ port security

Which security feature should be enabled in order to prevent an attacker from overflowing the MAC address table of a switch? + root guard + port security + storm control + BPDU filter

+ root guard

Which spanning-tree enhancement prevents the spanning-tree topology from changing by blocking a port that receives a superior BPDU? + BDPU filter + PortFast + BPDU guard + root guard

- AAA services - scanning for policy compliance - remediation for noncompliant devices

Which three functions are provided under Cisco NAC framework solution? (Choose three.) - VPN connection - AAA services - intrusion prevention - scanning for policy compliance - secure connection to servers - remediation for noncompliant devices

- enforcing network security policy for hosts that connect to the network - ensuring that only authenticated hosts can access the network

Which two functions are provided by Network Admission Control? (Choose two.) - protecting a switch from MAC address table overflow attacks - enforcing network security policy for hosts that connect to the network - ensuring that only authenticated hosts can access the network - stopping excessive broadcasts from disrupting network traffic - limiting the number of MAC addresses that can be learned on a single switch port

- VLAN double-tagging

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN? - DTP spoofing - DHCP spoofing - VLAN double-tagging - DHCP starvation


Ensembles d'études connexes

Chapter 3 - Property Insurance Basics

View Set

Week 5 Chapter 20: Molecular Technologies

View Set

marketing sample questions exam 2

View Set

CCNA V7 - Chapter 15 - Application Layer - Module Quiz

View Set

N475: Forensic and Correctional Nursing

View Set

chapter 1: economic foundations and models

View Set

Managing the Marketing Mix: Product, Price, Place, and Promotion

View Set

Practice Questions for HSMT 2103

View Set