Live Virtual Machine Lab 11.1: Module 11 Networking Hardening Techniques and Best Practices

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You need to create an access list on your router to filter specific IP addresses and ports. You created entries with permit statements and deny statements. But you forget to add one specific deny statement to filter traffic from host A. How will this traffic be treated?

Host A traffic will be permitted because, at the end of every access list, there is an implicit permit statement Host A traffic will not be processed by this access list at all, so if nothing else is denying it, it will be permitted Host A traffic will be permitted because, at the end of every access list, there is an explicit permit statement Host A traffic will be denied because, at the end of every access list, there is an implicit deny statement

You have configured a new DHCP server and connected it to the network. There is connectivity to the server, but the clients in the network are unable to obtain IP addresses from the server. Which of the following enabled feature on the switch can cause this issue?

IPv6 RA Guard DHCP Snooping Port-security Dynamic ARP Inspection

Which of the following versions of SNMP are considered unsecure? [Choose all that apply]

SNMPv3 SNMPv4 SNMPv1 SNMPv2c

You have empty ports on your switches, that is, no connected hosts. Which of the following are best practices to ensure that the empty ports are secure?

Move the ports from the default VLAN to a new, unused VLAN and then disable them Leave the ports in VLAN1 but disable them Keep the ports up and running in default VLAN (VLAN 1) Keep the ports up and running but move it to a new VLAN that is not used for production

You work in an organization as a network administrator. One of your new clients owns a hotel and has asked you to provide a single Internet connection for every room, but also ensure that the users are not visible to each other. Which technology on the switch will you use to meet the requirements stated in the scenario?

Create a separate VLAN for every room Use Promiscuous ports Create one VLAN and connect all rooms to that VLAN Create Private VLANs


Set pelajaran terkait

International marketing Chapter 4 (reading 4)

View Set

Sir Gawain and the Green Knight Reading Questions

View Set

Chapter 6: Who Owns the Corporation?

View Set

Samuel Gompers and European Debs

View Set

Why was the KKK gaining influence in the 1920's?

View Set