CIT116 Review Ch 10-13

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which 802.11 standards exclusively use the 5 GHz radio frequency? (Choose 2)

1. 802.11a 2. 802.11ac

What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

1. 802.11ac 2. 802.11a

Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

1. DHCP Snooping 2. Port Security

. Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)

1.wireless network password 2.AP password 3. SSID

How many channels are available for the 2.4 GHz band in Europe?

13

Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?

802.1X

Which of the following encryption methods uses CCMP to recognize if the encrypted and non-encrypted bits have been altered?

AES ( uses the Counter Clipher Mode with Block Chaining Message Authentication Code Protocol (CCMP) that allows destination hosts to recognize if the encrypted and non-encrypted bits have been altered)

Which of the following components are integrated in a wireless home router? (Choose three.)

Access Point, Switch, Router

Records what users do and what they access

Accounting

Which AAA component is responsible for collecting and reporting usage data for auditing and billing purposes?

Accounting (collects and reports data)

What is the term for an AP that does not send a beacon, but waits for clients to send probes?

Active Mode ( wireless clients initiate the process by broadcasting a probe request frame with the SSID on multiple channels, )

Which wireless topology mode is used by two devices to connect in a peer-to-peer network?

Ad hoc

A threat actor changes the MAC address of the threat actor's device to the MAC address of the default gateway. What type of attack is this?

Address Spoofing (attacks occur when the threat actor changes the MAC and/or IP address of the threat actor's device to pose as another legitimate device. Such as the default gateway.

On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?

Advanced

Proves that users are who they say they are

Authentication

Which AAA component is responsible for determining what the user can access?

Authentication (determines what a user can access)

What are the best ways to secure WLANs? (Choose two.)

Authentication , Encryption

Which AAA component is responsible for controlling who is permitted to access the network?

Authentication( controls who is permitted to access the network.

In an 802.1X implementation, which device is responsible for relaying responses?

Authenticator( which is typically a switch or wireless access point, is responsible for relaying messages between the supplicant (client) and authentication server.

Which of the following is a standalone device, like a home router, where the entire WLAN configuration resides on the device?

Autonomous AP

Which of the following is an IEEE 802.15 WPAN standard that uses a device-pairing process to communicate?

Bluetooth

What is the function provided by CAPWAP protocol in a corporate wireless network?

CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller

A threat actor discovers the IOS version and IP addresses of the local switch. What type of attack is this?

CDP reconnaissance (Threat actor can use packet sniffing software, such as Wireshark to view contents of CDP messages. which are sent unencrypted and include a variety of device information including the IOS version and IP address.)

A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?

Change the default user-name and password of the wireless router.

What is an advantage of SSID cloaking?​

Clients will have to manually identify the SSID to connect to the network.​

Which step is required before creating a new WLAN on a Cisco 3500 series WLC?

Create a new VLAN interface.

Which of the following mitigation techniques prevents ARP spoofing and ARP poisoning attacks?

DAI (Dynamic ARP Inspection)

A threat actor leases all the available IP addresses on a subnet. What type of attack is this?

DHCO Starvation ( When a threat actor requests and receives all the available IP address for a subnet)

Which of the following mitigation techniques prevents DHCP starvation and DHCP spoofing attacks?

DHCP snooping

Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

DHCP starvation

Which of the following modulation techniques spreads a signal over a larger frequency band?

DSSS ( Direct sequence spread spectrum)

What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

Disable both protocols on all interfaces where they are not required.

Which device monitors SMTP traffic to block threats and encrypt outgoing messages to prevent data loss?

ESA (Email Security Appliance) Is a device that is designed to monitor Simple Mail Transfer Protocol (SMTP)

What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

Enable port security

True or False: Laptops that do not have an integrated wireless NIC can only be attached to the network through a wired connection.

FALSE

True or False: When you need to expand the coverage of a small network, the best solution is to use a range extender.

FALSE

True or False: A rogue AP is a misconfigured AP connected to the network and a possible source of DoS attacks.

FALSE (A Rogue AP is an AP or wireless router that has been connected to a corporate network without explicit authorization and against cooperate policy.)

True or False: DTLS is enabled by default on the control and data CAPWAP tunnels.

FALSE (DTLS must be configured on the CAPWAP data tunnels but is enabled by default on the CAWAP control tunnel)

Which of the following modulation techniques rapidly switches a signal among frequency channels?

FHSS ( Frequency Hopping Spread Spectrum)

A network administrator enters the following commands on the switch SW1. SW1(config)# interface range fa0/5 - 10 SW1(config-if)# ip dhcp snooping limit rate 6 What is the effect after these commands are entered?

FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second

. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.

Which of the following mitigation techniques prevents MAC and IP address spoofing?

IPSG (IP Source Guard)

A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac . What is the purpose of this configuration command?

It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.

A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?

It is used to encrypt the messages between the WLC and the RADIUS server.

Which statement describes the behavior of a switch when the MAC address table is full?

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.

What is the result of a DHCP starvation attack?

Legitimate clients are unable to lease IP addresses

What type of attack is an "evil twin AP" attack?

MITM ( where an attacker introduces a rougue AP and configures it with the same SSID as a legitimate AP

. A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?

Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands

A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet?

NAT

Which of the following modulation techniques is used in the new 802.11ax standard?

OFDMA (Orthogonal Frequency Division Multiaccess)

Which of the following authentication methods does not use a password shared between the wireless client and the AP?

OPEN (WEP, WPA, WPA2 and WPA3 all use a pre shared password between the wireless client and the AP)

Which of the following antennas provide 360 degrees of coverage?

Omnidirectional

What is the term for an AP that openly advertises its service periodically?

Passive Mode ( the AP openly advertises its service by periodically sending broadcast beacon frames containing the SSID supported standards and security setting.)

. Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?

QoS

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

RADIUS

Which encryption method is used by the original 802.11 specification?

RC4 (Rivest Clipher Mode with static key)

Which attack encrypts the data on hosts in an attempt to extract a monetary payment from the victim?

Ransomware

Which of the following is most likely NOT the source of a wireless DoS attack?

Rogue AP ( Improperly configured devices malicious users and accidental interference are likely sources for a wireless DoS attack)

Which protocol can be used to monitor the network?

SNMP

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

SSH

A threat actor sends a BPDU message with priority 0. What type of attack is this?

STP attack ( is trying to become a root bridge in the STP topology)

A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

Split the traffic between the 2.4 GHz and 5 GHz frequency bands.

A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.

What is the behavior of a switch as a result of a successful MAC address table attack?

The switch will forward all received frames to all other ports within the VLAN( MAC address table attack will fill the MAC address table. When the MAC table is full, the switch begins the flood all the frames that it receives)

True or False: An ESS is created when two or more BSSs need to be joined to support roaming clients.

True

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

VLAN double-tagging

Which of the following wireless networks are specified in the IEEE 802.11 standards for the 2.4 GHz and 5 GHz radio frequencies?

WLAN (Wireless LAN)

. On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

WLANs

Which of the following authentication methods has the user enter a pre-shared password? (Choose two)

WPA Personal, WPA2 Personal ( both used pre-shared passwords)

. The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

accidental interference

. Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

accounting

Which access control component, implementation, or protocol collects and reports usage data?

accounting

Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?

accounting

While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?

active

Which access control component, implementation, or protocol controls who is permitted to access a network?

authentication

Determines what resources users can access or the operations they are allowed perform.

authorization

Which access control component, implementation, or protocol indicates success or failure of a client-requested service with a PASS or FAIL message?

authorization

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

authorization

Which type of management frame may regularly be broadcast by an AP?

beacon

. What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

enterprise

Which wireless network topology would be used by network engineers to provide a wireless network for an entire college building?

infrastructure

What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

omnidirectional

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

preventing rogue switches from being added to the network

An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?

shutdown

Which feature on a switch makes it vulnerable to VLAN hopping attacks?

the automatic trunking port feature enabled for all ports by default

What device is considered a supplicant during the 802.1X authentication process?

the client that is requesting authentication

Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?

the native VLAN of the trunking port being the same as a user VLAN

A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

to avoid interference from nearby wireless devices

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

true

Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?

wireless local-area network

Which type of wireless network is suitable for use in a home or office?

wireless local-area network

Which type of wireless network is suitable for providing wireless access to a city or district?

wireless metropolitan-area network

Which type of wireless network often makes use of devices mounted on buildings?

wireless metropolitan-area network

Which type of wireless network uses transmitters to provide wireless service over a large urban region?

wireless metropolitan-area network

Which type of wireless network commonly uses Bluetooth or ZigBee devices?

wireless personal-area network

Which type of wireless network uses low powered transmitters for a short-range network, usually 20 to 30 ft. (6 to 9 meters)?

wireless personal-area network

Which type of wireless network is suitable for national and global communications?

wireless wide-area network

Which type of wireless network uses transmitters to provide coverage over an extensive geographic area?

wireless wide-area network

A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac. What is the purpose of this configuration command?

§ It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.

The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

---SWA(config-if)# switchport port-security ----SWA(config-if)# switchport port-security maximum 2 ---SWA(config-if)# switchport port-security mac-address sticky

In the split MAC architecture for CAPWAP, which of the following are the responsibility of the WLC? (Choose four.)

1. Authentication 2. Association and re-association of a roaming clients 3. Termination of 802.11 traffic on a wired interface 4. Frame translation to the other protocols

A technician is troubleshooting a slow WLAN and decides to use the split-the-traffic approach. Which two parameters would have to be configured to do this? (Choose two.)

1. Configure the 5 GHz band for streaming multimedia and time sensitive traffic. 2. Configure the 2.4 GHz band for basic internet traffic that is not time sensitive.

What are three techniques for mitigating VLAN attacks? (Choose three.)

1. Enable trunking manually. 2. Disable DTP. 3. Set the native VLAN to an unused VLAN.

A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)

1. Ensure that the wireless NIC is enabled. 2. Ensure that the wireless SSID is chosen.

Which of the following statements are true about modes of operation for a FlexConnect AP? (Choose two.)

1. IN connect mode the WLC is reachable and performs all its CAPWAP functions 2. In standalone mode the WLC is unreachable and the AP switches local traffic and performs client authentication locally)

In the split MAC architecture for CAPWAP, which of the following are the responsibility of the AP? (Choose four.)

1. Packet acknowledgments and retransmissions 2. Beacons and probe responses 3. Frame queueing and packet prioritization 4.MAC layer data encryption and decryption

What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)

1. TACACS+ 2. RADIUS

A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

802.11ac

A threat actor sends a message that causes all other devices to believe the MAC address of the threat actor's device is the default gateway. What type of attack is this?

ARP spoofing (Threat actor send a gratuitous ARP reply causing all devices to believe that the threat actor's device is a legitimate device such as the default gateway.)

What UDP ports and IP protocols are used by CAPWAP for IPv6? (Choose three.)

IP protocol 136 in the frame header, and UDP port 5246, 5247

What UDP ports and IP protocols are used by CAPWAP for IPv4? (Choose three.)

IP protocol 17 in the frame header, and UDP port 5246, 5247

What IP versions does CAPWAP support?

IPv4 by default, but can configure IPv6. (CAPWAP can operate either over IPv4 or IPv6, but uses IPv4 by default)

Which standards organization is responsible for allocating radio frequencies?

ITU-R (International Telecommunication Union)

Which of the following mitigation techniques prevents many types of attacks including MAC address table overflow and DHCP starvation attacks?

Port Security

What mitigation technique must be implemented to prevent MAC address overflow attacks?

Port Security (primary method to mitigate MAC address table attacks is to implement port security.)

What would be the primary reason a threat actor would launch a MAC address overflow attack?

So that the treat actor can see frames that are destined for other devices. (Primary reason a threat actor launches a MAC address table over flow attack is to cause the switch to send all received frames out all ports so that the threat actor can capture the traffic)

A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?

The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.

A threat actor configures a host with the 802.1Q protocol and forms a trunk with the connected switch. What type of attack is this?

VLAN Hopping ( Threat actor can effectively hop VLANs if the threat actor's device belongs to the native VLAN and trunks with the switch.)

Which of the following wireless networks typically uses lower powered transmitters for short ranges?

WPAN (Wireless Personal Area Network)

Which device monitors HTTP traffic to block access to risky sites and encrypt outgoing messages?

WSA (Web Security Application)

Which access control component, implementation, or protocol is based upon usernames and passwords?

authentication

Which access control component, implementation, or protocol is implemented either locally or as a server-based solution?

authentication

. Which access control component, implementation, or protocol controls what users can do on the network?

authorization

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

local AAA

. A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?

protect

As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?

§ sticky secure MAC addresses

Which of the following mitigation techniques are used to protect Layer 3 through Layer 7 of the OSI Model? (Choose three.)

1. VPN 2. Firewall 3. IPS devices

Which devices are specifically designed for network security? (Choose three)

1. VPN-enabled router 2. NGFW 3. NAC

Which three Cisco products focus on endpoint security solutions? (Choose three.) § IPS Sensor Appliance

1. Web Security Appliance 2. Email Security Appliance 3. NAC Appliance

Which two commands can be used to enable BPDU guard on a switch? (Choose two.)

1.S1(config)# spanning-tree portfast bpduguard default 2.S1(config-if)# spanning-tree bpduguard enable

What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

1.receiving a broadcast beacon frame 2.transmitting a probe request

How many channels are available for the 5 GHz band?

24

How many address fields are in the 802.11 wireless frame?

4


Ensembles d'études connexes

CFA Financial Reporting and Analysis

View Set

Chapter 27: Male Reproductive System Learning Outcomes

View Set

Chapter 6: Fostering online learning with websites and apps

View Set

Property and Casualty Practice exam

View Set

Domain II - Exercise Prescription & Implementation

View Set

JS230 DOM and Asynchronous Programming with JavaScript

View Set

Communication Applications Chapter 1 Key Concepts & Vocabulary

View Set

Principles of Learning and Teaching: Early Childhood

View Set