CCNA 2 Chapter 2

Ace your homework & exams now with Quizwiz!

What 4 things should you look for if an interface is down?

* check for proper or damaged cables/connectors * a mismatch in speed setting * excessive noise * late colissions

Compare EXEC mode commands enable password and enable secret password.

*The enable secret password command provides better security than the enable password. * The enable password and enable secret password protect access to privileged EXEC mode.

Which 2 statements are true regarding switch port security?

* Dynamically learned secure MAC addresses are lost when the switch reboots * If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.

What 2 important characteristics about Layer 2 Ethernet switches are true?

* Layer 2 switches have multiple collision domains * Layer 2 switches can send traffic based on the destination MAC address

For security purposes, should you use VLAN 1 for the management VLAN?

NO

Which command configures basic port security?

S1(config-if)# switchport mode access S1(config-if)# switchport port-security

Which command enables sticky learning for a switch port?

S1(config-if)# switchport port-security mac-address sticky

How can you access the switch OS if there are missing or damaged filed systems?

use the boot loader - connect via a console cable to a PC and use terminal emulation software

What 6 steps are needed to configure basic switch settings?

1 - erase and reload the switch 2 - assign hostname 3 - configure password encryption 4 - assign secret password 5 - prevent DNS lookups 6 - create MOTD

Describe the boot sequence for a Cisco switch:

1st - loads POST program stored in ROM 2nd - loads boot loader software stored in ROM 3rd - boot loader performs low-level CPU initialization & initializes the CPU registers 4th - boot loader initializes flash file system on the system board 5th - boot loader locates & loads a default IOS operating system software image into memory and transfers control of the switch over to IOS

If a switch has 2 ports, how many collision domains can it have?

2

Which ports are assigned to VLAN 1 by default?

ALL of them

The partial output of the show running-config command. The enable password on this switch is "cisco." What can be determined from the output shown?

Any configured line mode passwords will be encrypted in this configuration.

What are 2 ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks?.

Change passwords regularly. Turn off unnecessary services.

What happens when the transport input ssh command is entered on the switch vty lines?

Communication between the switch and remote users is encrypted.

VLAN 99 has been configured as the management VLAN with an IP address and subnet mask. Show interface VLAN99 output display shows the line protocol is down? Which action can change the state of the line?

Connect a host to an interface associated with VLAN 99

What happens when Host 1 attempts to send data?

Frames from Host 1 cause the interface to shut down.

What is included in CDP information?

IP address, software version, and the native VLAN - which attackers can use - DoS

Using the command switchport port-security - sets the maximum MAC addresses to what? And, the violation action to what?

Maximum 1 MAC address Violation action to shutdown

Where is the startup configuration stored?

NVRAM

The switch and workstation are administratively configured for full-duplex operation. What will or won't happen on this link?

No collisions will occur on this link.

Where is the running configuration stored?

RAM

Which command verifies which switch ports are up?

S1# show ip interface brief

Which command displays all secure MAC addresses configured on all switch interfaces?

S1# show port-security address

Which command verifies port security settings?

S1# show port-security int f0/1

Which 3 commands enable DHCP Snooping?

S1(config)# ip dhcp snooping S1(config)# ip dhcp snooping vlan ? S1(config)# ip dhcp snooping trust

What steps are needed to create a new VLAN on a switch to be managed remotely?

S1(config)# vlan 99 S1(config-vlan)# name Management S1(config-vlan)# exit S1(config)# interface vlan 99 S1(config-if)# ip address 172.16.1.15 255.255.0.0 S1(config-if)# no shutdown S1(config-if)# switchport access vlan 99 S1(config-if)# exit S1(config)# ip default-gateway 172.16.1.1 S1(config)# end S1#copy running-config startup-config

Which command sets the maximum # of secure MAC addresses allowed on a switch port?

S1(config-if)# switchport port-security maximum 50

Which command configures the violation mode on a switch port?

S1(config-if)# switchport port-security violation * after violation type protect, restrict, or shutdown

Which command disables a range of switch ports?

S1(config-if-range)# shutdown S1(config-if-range)# int range f0/4 - 24

What refers to a protocol that provides an encrypted connection? The protocol replaces the clear text Telnet protocol for Cisco device management.

SSH

What action does SW1 take on a frame sent from PCA to PCC if the MAC address table of SW1 is empty?

SW1 floods the frame on all ports on SW1, except for the port that received the frame.

What happens whent the command banner login "Authorized personnel Only" is issued on a switch?

The command will cause the message Authorized personnel Only to display before a user logs in.

When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?

The hosts return to a listen-before-transmit mode.

When a switch receives a frame and the source MAC address is not found in the switching table, what action will be taken by the switch to process the incoming frame?

The switch will map the source MAC address to the port on which it was received.

What is DCHP snooping?

a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests - ports are identified as trusted & untrusted

Describe penetration testing:

a simulated attack against the network to determine how vulnerable it would be in a real attack - admin can identify weaknesses

What is SVI (switched virtual interface)?

a special IP address Cisco switches can be configured with - used for remote access to the switch

Define late collisions (output error):

after 512 bits of the frame - the preamble - have been transmitted - usually caused by excessive cable lengths or duplex misconfiguration

What would be an ideal environment to carry out penetration tests?

an off-line test bed network that mimics the actual production network

A network administrator uses the CLI to enter a command that requires several parameters. The switch responds with "% Incomplete command". The administrator cannot remember the missing parameters. What can the administrator do to get the parameter information?

append a space and then ? to the last parameter

What is DHCP spoofing?

attacker configures a fake DHCP server to issue DHCP address to clients - forces clients to use false DNS servers - makes clients use the attacker as their default gateway - caused DHCP address pool to become depleted

What is a DHCP starvation attack?

attacker floods the DHCP server with requests to use up all available IP addresses the DHCP server can issue - leads to DoS

Define a brute force attack:

attacker uses a dictionary to find common passwords to initiate a Telnet session

To use auto-MDIX on an interface, what must the interface speed and duplex be set to so auto-MDIX operates correctly?

auto detect

A network technician wants to implement SSH as the means by which a router may be managed remotely. What are 2 procedures that the technician should use to use SSH?

configure authentication define the asymmetrical keys

What do you need to do for remote switch management?

configure the switch with an IP address and subnet mask - if managing the switch from a remote network - also configure the switch with the default gateway

What should be looked at when troubleshooting switch port issues?

duplex and speed settings

What is a MAC address table overflow attack?

flooding attacks make use of limited size in a MAC address table to overwhelm the switch with fake source MAC addresses until the switch MAC address table is full

Which command line interface (CLI) mode allows users to configure switch parameters, such as the hostname and password?

global configuration mode

Which hosts will receive a broadcast frame sent from Host A?

hosts B, C, D, and E

Define runts (input error):

less than 64-byte minimum allowed length - usually caused by malfunctioning NICs

Define giants (input error):

longer than the maximum allowed length

The network admin has decided to allow only SSH connections to Switch1. After the commands are applied, the admin is able to connect to Switch1 using both SSH and Telnet. What is most likely the problem?

missing transport input ssh command

What is the factory default interface violation mode?

shutdown - interface becomes error disabled

What is Network Time Protocol (NTP)?

synchronizes the clocks of computer systems over packet-switched, variable-latency data networks

In full-duplex mode, what should be disabled?

the NIC collision detection circuit

What happens if a rouge device on an untrusted port tries to send a DHCP response packet into the network?

the port is shut down

Define input errors:

the sum of all errors in datagrams received on the interface

Define output errors:

the sum of all errors that prevented the final transmission of datagrams out of the interface

If you disable sticky learning, what happens to sticky secure MAC addresses?

they remain part of the MAC address table, but are removed from the running configuration

If a network admin enters these commands on a switch, what will be the result? Switch1(config-line)# line console 0 Switch1(config-line)# password cisco Switch1(config-line)# login

to secure console port access with password cisco

Which ports can source all DHCP messages?

trusted

Which ports can source DHCP source requests only?

untrusted

How do you secure a network?

use a written security policy, shut down unused services & ports, use strong passwords & change them often, control physical access to devices, use HTTPS, perform backups, develop policies to validate identities (over the phone, via email, and in person), encrypt & password-protect sensitive data, implement security hardware & software (firewalls), install security patches often, and use network security auditing tools.

What causes a CRC input error?

usually a media or cable error

The switch and the hub have default configurations, and the switch has built its CAM table. Which of the hosts will capture a copy of the frame when workstation A sends a unicast packet to workstation C?

workstation C


Related study sets

مميزات مثلث متساوي الساقين

View Set

Biochemistry I Chapter 2 Problems

View Set

Chapter 5: The Integumentary System

View Set

CNA Quizes elder abuse-chapter 4

View Set

Ch. 65 Assessment of the Renal/Urinary System

View Set