Cisco 2 Midterm Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which port speed will be autonegotiated between a host with a 1 Gbps NIC connecting to a Cisco Catalyst 2960 switch with a 100 Mbps port? 10 Mbps 100 Mbps 1 Gbps 10 Gbps

100 Mbps

When verifying routes, what code is used to identify directly connected routes in the routing table? C D L R

C

A threat actor discovers the IOS version and IP addresses of the local switch. What type of attack is this? Address spoofing ARP spoofing CDP reconnaissance DHCP starvation STP attack VLAN hopping

CDP reconnaissance

Which of the following mitigation techniques prevents MAC and IP address spoofing? IPSG DHCP snooping DAI Port security

IPSG

Refer to the exhibit Question 2 Topology. PC2 sends an ARP broadcast frame. Which PCs will receive the ARP broadcast frame? (Choose all that apply.) PC1 PC3 PC4 PC5 PC6

PC3, PC4, PC6

What mitigation technique must be implemented to prevent MAC address overflow attacks? IPSG DAI Port security DHCP snooping

Port security

Which two commands can be used to enable PortFast on a switch? (Choose two.) S1(config-if)# spanning-tree portfast S1(config-line)# spanning-tree portfast S1(config)# spanning-tree portfast default S1(config-if)# enable spanning-tree portfast S1(config)# enable spanning-tree portfast default

S1(config-if)# spanning-tree portfast S1(config)# spanning-tree portfast default

A threat actor sends a BPDU message with priority 0. What type of attack is this? Address spoofing ARP spoofing CDP reconnaissance DHCP starvation STP attack VLAN hopping

STP attack

Which filtering expression will show all output lines starting from the line matching the filtering expression? section begin include

begin

What is the default switchport mode for Cisco Catalyst switches? access trunk dynamic auto dynamic desirable

dynamic auto

True or false? DTP is an open standard IEEE protocol that specifies auto negotiation of switch trunk links. true false

false

True or false? Two switchports on a link both configured as dynamic auto will successfully negotiate a trunk. true false

false

Which two special characteristics do LAN switches use to alleviate network congestion? (Choose two.) fast port speeds fast internal switching low port densities small frame buffers

fast port speeds, fast internal switching

You are troubleshooting an inter-VLAN issue on a router and need to verify the status and IP address of all interfaces in a condensed format. Which inter-VLAN routing troubleshooting command would you use to do this? show interfaces show interfaces [interface-id] switchport show ip interface brief show ip route show vlan

show ip interface brief

You are troubleshooting an inter-VLAN issue on a router and need to verify that the subinterfaces are in the routing table. Which inter-VLAN routing troubleshooting command would you use to do this? show interfaces show interfaces [interface-id] switchport show ip interface brief show ip route show vlan

show ip route

Which command will display a summary of all IPv6-enabled interfaces on a router that includes the IPv6 address and operational status? show ip interface brief show ipv6 route show running-config interface show ipv6 interface brief

show ipv6 interface brief

You are troubleshooting an inter-VLAN issue on a switch and need to check the list of VLANs and their assigned ports. Which inter-VLAN routing troubleshooting command would you use to do this? show interfaces show interfaces [interface-id] switchport show ip interface brief show ip route show vlan

show vlan

Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco? shutdown ip dhcp snooping switchport port-security mac-address sticky switchport port-security violation shutdown switchport port-security mac-address sticky [mac-address]

shutdown

A network administrator is configuring DAI on a switch with the command ip arp inspection validate dst-mac. What is the purpose of this configuration command? to check the destination MAC address in the Ethernet header against the MAC address table to check the destination MAC address in the Ethernet header against the user-configured ARP ACLs to check the destination MAC address in the Ethernet header against the target MAC address in the ARP body to check the destination MAC address in the Ethernet header against the source MAC address in the ARP body

to check the destination MAC address in the Ethernet header against the target MAC address in the ARP body

Which two DTP modes will form a trunk with an interface that is configured as dynamic auto? (Choose two.) trunk dynamic desirable

trunk, dynamic desirable

What are two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks? (Choose two.) unknown port untrusted port unauthorized port trusted DHCP port authorized DHCP port established DHCP port

untrusted port, trusted DHCP port

Which AAA component is responsible for controlling who is permitted to access the network? Authentication Authorization Account

Authentication

Refer to the exhibit Question 1 Topology. PC1 sends an ARP broadcast frame. Which PC will receive the ARP broadcast frame? PC2 PC3 PC4 PC5 PC6

PC4

A network administrator is configuring DAI on a switch. Which command should be used on the uplink interface that connects to a router? ip arp inspection vlan ip arp inspection trust ip dhcp snooping spanning-tree portfast

ip arp inspection trust

A network administrator is configuring DHCP snooping on a switch. Which configuration command should be used first? ip dhcp snooping ip dhcp snooping vlan ip dhcp snooping trust ip dhcp snooping limit rate

ip dhcp snooping

A threat actor sends a message that causes all other devices to believe the MAC address of the threat actor's device is the default gateway. What type of attack is this? Address spoofing ARP spoofing CDP reconnaissance DHCP starvation STP attack VLAN hopping

ARP spoofing

Which AAA component is responsible for collecting and reporting usage data for auditing and billing purposes? Authentication Authorization Account

Accounting

A threat actor changes the MAC address of the threat actor's device to the MAC address of the default gateway. What type of attack is this? Address spoofing ARP spoofing CDP reconnaissance DHCP starvation STP atack VLAN hopping

Address spoofing

What is a recommended best practice when dealing with the native VLAN? Turn off DTP Use port security Assign it to an unused VLAN Assign the same VLAN number as the management VLAN

Assign it to an unused VLAN

In an 802.1X implementation, which device is responsible for relaying responses? Supplicant Authenticator Router Authentication server Client

Authenticator

Which AAA component is responsible for determining what the user can access? Authentication Authorization Account

Authorization

Which of the following mitigation techniques prevents ARP spoofing and ARP poisoning attacks? IPSG DHCP snooping DAI Port security

DAI

Which of the following mitigation techniques prevents DHCP starvation and DHCP spoofing attacks? IPSG DHCP snooping DAI Port security

DHCP snooping

A threat actor leases all the available IP addresses on a subnet. What type of attack is this? Address spoofing ARP spoofing CDP reconnaissance DHCP starvation STP attack VLAN hopping

DHCP starvation

What is the best way to prevent a VLAN hopping attack? Disable STP on all nontrunk ports Use ISL encapsulation on all trunk links Use VLAN 1 as the native VLAN on trunk ports Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports

Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports

Which device monitors SMTP traffic to block threats and encrypt outgoing messages to prevent data loss? NGFW ESA NAC WSA

ESA

Which procedure is recommended to mitigate the chances of ARP spoofing? Enable port security globally. Enable DHCP snooping on selected VLANs Enable DAI on the management VLAN Enable IP Source Guard on trusted ports

Enable DHCP snooping on selected VLANs

True or False? It is a best practice to configure the native VLAN as VLAN 1. True False

False

An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation? Reboot the switch Issue the shutdown command followed by the no shutdown command on the interface Issue the no switchport port-security command, then re-enable port security Issue the no switchport port-security violation shutdown command on the interface

Issue the shutdown command followed by the no shutdown command on the interface

Refer to the exhibit Question 3 Topology. PC3 sends an ARP broadcast frame. Which PC will receive the ARP broadcast frame? PC1 PC2 PC4 PC5 PC6

PC5

Which of the following mitigation techniques prevents many types of attacks including MAC address table overflow and DHCP starvation attacks? IPSG DHCP snooping DAI Port security

Port security

Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command? ROM RAM NVRAM flash

RAM

Which attack encrypts the data on hosts in an attempt to extract a monetary payment from the victim? DDoS Data breach Malware Ransomware

Ransomware

Refer to each of the scenario topologies. Which statements best describe the different types of inter-VLAN routing solutions? (Choose all that apply.) Scenario A is a legacy inter-VLAN solution. Scenario B is a Layer 3 inter-VLAN solution. Scenario B and C are both Router-on-a-stick inter-VLAN solutions. Scenario A is a Layer 3 inter-VLAN solution. Scenario B is a legacy inter-VLAN solution. Scenario C is a router-on-a-stick inter-VLAN solution.

Scenario A is a Layer 3 inter-VLAN solution. Scenario B is a legacy inter-VLAN solution. Scenario C is a router-on-a-stick inter-VLAN solution.

What would be the primary reason a threat actor would launch a MAC address overflow attack? So that the threat actor can see frames that are destined for other devices. So that the threat actor can execute arbitrary code on the switch. So that the switch stops forwarding traffic So that legitimate hosts cannot obtain a MAC address.

So that the threat actor can see frames that are destined for other devices.

An IPv6-enabled interface is required to have which type of address? loopback global unicast link-local static

link-local

Which type of VLAN is assigned to 802.1Q trunk ports to carry untagged traffic? default native data management

native

What character is used to enable the filtering of commands? pipe | comma , colon : semi colon ;

pipe |

Which security feature should be enabled in order to prevent an attacker from overflowing the MAC address table of a switch? BPDU filter port security storm control root guard

port security

Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.) port security extended ACL DHCP snooping DHCP server failover strong password on DHCP servers

port security, DHCP snooping

Which device separates broadcast domains? access point hub router switch

router

Which command will display packet flow counts, collisions, and buffer failures on an interface? show interface show ip interface show running-config interface

show interface

You are troubleshooting an inter-VLAN issue on a router and need to verify the status of an access port and its access mode VLAN. Which troubleshooting command would you use to do this? show interfaces show interfaces interface-id switchport show ip interface brief show vlan

show interfaces [interface-id] switchport

What is the behavior of a switch as a result of a successful MAC address table attack? The switch will shut down. The switch interfaces will transition to the error-disabled state. The switch will forward all received frames to all other ports within the VLAN. The switch will drop all received frames.

The switch will forward all received frames to all other ports within the VLAN.

True or False? VLANs can improve security by isolating sensitive data from the rest of the network. True False

True

True or False? VLANs improve network performance by segmenting broadcast domains. True False

True

A threat actor configures a host with the 802.1Q protocol and forms a trunk with the connected switch. What type of attack is this? Address spoofing ARP spoofing CDP reconnaissance DHCP starvation STP attack VLAN hopping

VLAN hopping

What Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol? VLAN hopping DHCP spoofing ARP poisoning ARP spoofing

VLAN hopping

Which of the following mitigation techniques are used to protect Layer 3 through Layer 7 of the OSI Model? (Choose three.) DHCP snooping VPN Firewalls IPSG IPS devices

VPN, Firewalls, IPS devices

Which devices are specifically designed for network security? (Choose three) VPN-enabled router NGFW Switch WLC NAC

VPN-enabled router, NGFW, NAC

Which device monitors HTTP traffic to block access to risky sites and encrypt outgoing messages? NGFW ESA NAC WSA

WSA

Which is true of VLAN 1? (Choose all that apply.) All switch ports are assigned to VLAN 1 by default. The Native VLAN is VLAN 1 by default. The management VLAN is VLAN 1 by default. VLAN 1 cannot be renamed or deleted.

all are correct

On what switch ports should PortFast be enabled to enhance STP stability? all end-user ports only ports that attach to a neighboring switch all trunk ports that are not root ports only ports that are elected as designated ports

all end-user ports


Set pelajaran terkait

Accident and health insurance Basics questions

View Set

chapter 13 peripheral nervous system and reflex activity

View Set

Exponential And Logarithmic Functions

View Set