• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back

What is the first action in the boot sequence when a switch is powered on?

load a power-on self-test program

An attacker has bypassed physical security and was able to connect a laptop to a Ethernet interface on a switch. If all the switch ports are configured with port security and the violation mode is set to factory-default, which action is taken against the attacker?

Packets with unknown source addresses are dropped and the interface becomes error-disabled and turns off the port LED.

What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? (Choose two.)

Change passwords regularly.


Turn off unnecessary services.

A network technician wants to implement SSH as the means by which a router may be managed remotely. What are two procedures that the technician should use to successfully complete this task?

Configure authentication.




Define the asymmetrical keys.

How can DHCP packets be used to threaten a switched LAN?

Numerous DHCP requests are sent to the DHCP server from spoofed hosts, causing the DHCP address pool to become depleted.

In an Ethernet network, frames smaller than 64 bytes are called ___________.

runts

What would be an ideal environment to carry out penetration tests?

on an off-line test bed network that mimics the actual production network

A network administrator plugs a new PC into a switch port. The LED for that port changes to solid green. What statement best describes the current status of the port?

The port is operational and ready to transmit packets.

A network administrator has configured ​VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask. The administrator issues the show interface vlan 99 command and notices that the line protocol is down. Which action can change the state of the line protocol to up?

Connect a host to an interface associated with VLAN 99

What is the result of issuing the no switchport port-security mac-address sticky command on an interface with port security configured?​​

The sticky secure MAC addresses remain part of the address table but are removed from the running configuration.

Which configuration must be in place for the auto-MDIX feature to function on a switch interface?

The speed and duplex of the interface must be configured for auto detect.

The initialism _______ refers to a protocol that provides an encrypted connection. The protocol replaces the clear text Telnet protocol for Cisco device management.

SSH

What can be determined from the partial output of the show running-config command?
What can be determined from the partial output of the show running-config command?
This appears to be the default configuration of the switch.
The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
No collisions will occur on this link.

A production switch is reloaded and finishes with a Switch> prompt. What two facts can be determined?

POST occurred normally.




A full version of the Cisco IOS was located and loaded.

What conclusion can be drawn based on the partial output in the exhibit?

What conclusion can be drawn based on the partial output in the exhibit?

A malfunctioning NIC can cause frames to be transmitted that are longer than the allowed maximum length.

Two statements that are true regarding switch port security

If fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached.




Dynamically learned secure MAC addresses are lost when the switch reboots.

An administrator wants to use a network security auditing tool on a switch to verify which ports are not protected against a MAC flooding attack. For the audit to be successful, what important factor must the administrator consider?

the aging-out period of the MAC address table

In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server in order to prevent legitimate hosts from obtaining network access?​

DHCP starvation

What is a function of the switch boot loader?

to provide an environment to operate in when the switch operating system cannot be found

Which two basic functions are performed by network security tools?

revealing the type of information an attacker is able to gather from monitoring network traffic




simulating attacks against the production network to determine any existing vulnerabilities

In which situation would a technician use the show interfaces switch command?

when packets are being dropped from a particular directly attached host

A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

protect

Which method would mitigate a MAC address flooding attack?

configuring port security

 What can be determined about port security from the information that is shown?

What can be determined about port security from the information that is shown?

The port violation mode is the default for any port that has port security enabled.

What is one difference between using Telnet or SSH to connect to a network device for management purposes?

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?

VLAN 1

Which two statements are true about using full-duplex Fast Ethernet?

Full-duplex Fast Ethernet offers 100 percent efficiency in both directions.

Performance is improved with bidirectional data flow.
Which statement describes the port speed LED on the Cisco Catalyst 2960 switch?
If the LED is green, the port is operating at 100 Mb/s.

Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks?

port security




DHCP snooping

The network administrator wants to configure Switch1 to allow SSH 
connections and prohibit Telnet connections. How should the network 
administrator change the displayed configuration to satisfy the 
requirement?
The network administrator wants to configure Switch1 to allow SSH connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement?
Modify the transport input command.