MODULES 11-13

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

DHCP starvation*

1. Which Layer 2 attack will result in legitimate users not getting valid IP addresses?

VLAN double-tagging*

12. Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

It checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.*

13. A network administrator is configuring DAI on a switch with the command ip arp inspection validate src-mac. What is the purpose of this configuration command?

S1(config)# spanning-tree portfast bpduguard default* S1(config-if)# spanning-tree bpduguard enable*

14. Which two commands can be used to enable BPDU guard on a switch? (Choose two.)

sticky secure MAC addresses*

15. As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?

beacon

16. Which type of management frame may regularly be broadcast by an AP?

receiving a broadcast beacon frame* transmitting a probe request*

17. What are the two methods that are used by a wireless NIC to discover an AP? (Choose two.)

to avoid interference from nearby wireless devices*

18. A technician is configuring the channel on a wireless router to either 1, 6, or 11. What is the purpose of adjusting the channel?

active

19. While attending a conference, participants are using laptops for network connectivity. When a guest speaker attempts to connect to the network, the laptop fails to display any available wireless networks. The access point must be operating in which mode?

Enable port security.*

2. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?

802.11ac*

20. A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?

Change the default user-name and password of the wireless router.*

21. A technician is about to install and configure a wireless network at a small branch office. What is the first security measure the technician should apply immediately upon powering up the wireless router?

Advanced

22. On a Cisco 3504 WLC dashboard, which option provides access to the full menu of features?

Create a new VLAN interface.*

23. Which step is required before creating a new WLAN on a Cisco 3500 series WLC?

The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia.*

24. A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?

It is used to encrypt the messages between the WLC and the RADIUS server.*

25. A network administrator is configuring a RADIUS server connection on a Cisco 3500 series WLC. The configuration requires a shared secret password. What is the purpose for the shared secret password?

wireless network password* AP password* SSID*

26. Which three parameters would need to be changed if best practices are being implemented for a home wireless AP? (Choose three.)

authentication

27. Which access control component, implementation, or protocol is based upon usernames and passwords?

wireless local-area network*

28. Which type of wireless network is based on the 802.11 standard and a 2.4-GHz or 5-GHz radio frequency?

DHCP Snooping* Port Security

29. Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)

Web Security Appliance* Email Security Appliance* NAC Appliance*

3. Which three Cisco products focus on endpoint security solutions? (Choose three.)

Enable trunking manually.* Disable DTP. Set the native VLAN to an unused VLAN.*

30. What are three techniques for mitigating VLAN attacks? (Choose three.)

RADIUS

32. A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.*

33. A technician is troubleshooting a slow WLAN that consists of 802.11b and 802.11g devices . A new 802.11n/ac dual-band router has been deployed on the network to replace the old 802.11g router. What can the technician do to address the slow wireless speed?

authorization

determines what resources users can access or the operations they are allowed to perfrom

authentication

proves that users are who they say they are

accounting

records what users do and what they access

802.11ac* 802.11n

68. What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

accidental interference*

34. The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?

CAPWAP provides the encapsulation and forwarding of wireless user traffic between an access point and a wireless LAN controller.*

35. What is the function provided by CAPWAP protocol in a corporate wireless network?

TACAS+ RADIUS

38. What are two protocols that are used by AAA to authenticate users against a central database of usernames and password? (Choose two.)

Legitimate clients are unable to lease IP addresses.*

39. What is the result of a DHCP starvation attack?

the native VLAN of the trunking port being the same as a user VLAN*

40. Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?

accounting

41. Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

Shutdown

43. An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?

Ensure that the wireless NIC is enabled.* Ensure that the wireless SSID is chosen.*

44. A laptop cannot connect to a wireless access point. Which two troubleshooting steps should be taken first? (Choose two.)

Clients will have to manually identify the SSID to connect to the network.​*

45. What is an advantage of SSID cloaking?​

Enterprise

46. What is a wireless security mode that requires a RADIUS server to authenticate wireless users?

Split the traffic between the 2.4 GHz and 5 GHz frequency bands.*

47. A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

SNMP

48. Which protocol can be used to monitor the network?

NAT

49. A network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network. Which service is used on the wireless router to allow the employee laptops to access the internet?

local AAA*

5. Which authentication method stores usernames and passwords in the router and is ideal for small networks?

QoS*

50. Which service can be used on a wireless router to prioritize network traffic among different types of applications so that voice and video data are prioritized over email and web data?

802.1X*

51. Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?

wireless wide-area network*

52. Which type of wireless network is suitable for national and global communications?

the automatic trunking port feature enabled for all ports by default*

53. Which feature on a switch makes it vulnerable to VLAN hopping attacks?

authorization

54. Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

FastEthernet ports 5 through 10 can receive up to 6 DHCP discovery messages per second.*

56. A network administrator enters the following commands on the switch SW1. What is the effect after these commands are entered?

protect

57. A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?

Make sure that different SSIDs are used for the 2.4 GHz and 5 GHz bands.*

58. A network administrator is working to improve WLAN performance on a dual-band wireless router. What is a simple way to achieve a split-the-traffic result?

Authorization

59. Which access control component, implementation, or protocol controls what users can do on the network?

Disable both protocols on all interfaces where they are not required.*

6. What represents a best practice concerning discovery protocols such as CDP and LLDP on network devices?

wireless metropolitan-area network*

60. Which type of wireless network is suitable for providing wireless access to a city or district?

WLANs

61. On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which tab allows a network administrator to access and configure a WLAN for a specific security option such as WPA2?

Omnidirectional

62. What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

802.11ac* 802.11ª*

63. What two IEEE 802.11 wireless standards operate only in the 5 GHz range? (Choose two.)

preventing rogue switches from being added to the network*

64. What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

Authentication*

65. Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?

wireless wide-area network*

66. Which type of wireless network uses transmitters to provide coverage over an extensive geographic area?

802.1X*

67. Which access control component, implementation, or protocol controls who is permitted to access a network?

SSH

7. Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

It treats frames as unknown unicast and floods all incoming frames to all ports within the local VLAN.*

8. Which statement describes the behavior of a switch when the MAC address table is full?

the client that is requesting authentication*

9. What device is considered a supplicant during the 802.1X authentication process?

True

In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.

7

PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

SWA(config-if)# switchport port-security SWA(config-if)# switchport port-security maximum 2 SWA(config-if)# switchport port-security mac-address sticky***

Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.*

Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.*

The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?

The port violation mode is the default for any port that has port security enabled.*

What can be determined about port security from the information that is shown?


संबंधित स्टडी सेट्स

Ch 14: Nursing Management During Labor and Birth

View Set

REAL 4100: Real Estate Finance & Investment Analysis

View Set

CEH CH 10: Cryptographic Attacks and Defenses

View Set

Chapter 15 Assignment for Module 11

View Set

Chapter 10: Fluid and Electrolytes, NCLEX-Style Chapter Review Questions

View Set