Module 11- Switch Security Configuration

Module 11- Switch Security Configuration

11th Grade

20 Qs

quiz-placeholder

Similar activities

Latihan Routing

Latihan Routing

11th Grade

20 Qs

PTS AIJ XI TKJ 2020

PTS AIJ XI TKJ 2020

11th Grade

20 Qs

Latihan uts Genap - produktif XI TKJ

Latihan uts Genap - produktif XI TKJ

11th Grade

15 Qs

Administrasi Infrastruktur Jaringan XI TKJ2

Administrasi Infrastruktur Jaringan XI TKJ2

11th Grade

25 Qs

Adm. Infrastruktur Jaringan

Adm. Infrastruktur Jaringan

11th Grade

20 Qs

Sprawdzian 2 klasa 1 przełączniki

Sprawdzian 2 klasa 1 przełączniki

8th Grade - University

25 Qs

PAT AIJ KELAS 11

PAT AIJ KELAS 11

11th Grade

20 Qs

Kompetensi Pengetahuan -AIJ11S1-003

Kompetensi Pengetahuan -AIJ11S1-003

11th Grade

15 Qs

Module 11- Switch Security Configuration

Module 11- Switch Security Configuration

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Alicia Pierce

Used 34+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Media Image

Refer to the exhibit. The Fa0/2 interface on switch S1 has been configured with the switchport port-security mac-address 0023.189d.6456 command and a workstation has been connected. What could be the reason that the Fa0/2 interface is shutdown?

The connection between S1 and PC1 is via a crossover cable.

The Fa0/24 interface of S1 is configured with the same MAC address as the Fa0/2 interface.

S1 has been configured with a switchport port-security aging command.

The MAC address of PC1 that connects to the Fa0/2 interface is not the configured MAC address.

Answer explanation

The security violation counter for Fa0/2 has been incremented (evidenced by the 1 in the SecurityViolation column). The most secure addresses allowed on port Fa0/2 is 1 and that address was manually entered. Therefore, PC1 must have a different MAC address than the one configured for port Fa0/2. Connections between end devices and the switch, as well as connections between a router and a switch, are made with a straight-through cable.

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Media Image

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

No one is allowed to disconnect the IP phone or the PC and connect some other wired device.

If a different device is connected, port Fa0/2 is shut down. The switch should automatically detect the MAC address of the IP phone and the PC and add those addresses to the running configuration.

SWA(config-if)# switchport-security

SWA(config-if)# switch port security mac-address sticky

SWA(config-if)# switchport port-security mac-address sticky

SWA(config-if)# switchport port-security maximum 2

SWA(config-if)# switchport port-security

SWA(config-if)# switchport port-security maximum 2

SWA(config-if)# switchport port-security mac-address sticky

SWA(config-if)# switchport port-security

SWA(config-if)# switchport port-security maximum 2

SWA(config-if)# switchport port-security mac-address sticky

SWA(config-if)# switchport port-security violation restrict

Answer explanation

The default mode for a port security violation is to shut down the port so the switchport port-security violation command is not necessary. The switchport port-security command must be entered with no additional options to enable port security for the port. Then, additional port security options can be added.

3.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Media Image

Refer to the exhibit. Port security has been configured on the Fa 0/12 interface of switch S1. What action will occur when PC1 is attached to switch S1 with the applied configuration?

Frames from PC1 will be dropped, and there will be no log of the violation.

Frames from PC1 will cause the interface to shut down immediately, and a log entry will be made.

Frames from PC1 will be forwarded to its destination, and a log entry will be created.

Frames from PC1 will be forwarded to its destination, but a log entry will not be created.

Frames from PC1 will be forwarded since the switchport port-security violation command is missing.

Answer explanation

Manual configuration of the single allowed MAC address has been entered for port fa0/12. PC1 has a different MAC address and when attached will cause the port to shut down (the default action), a log message to be automatically created, and the violation counter to increment. The default action of shutdown is recommended because the restrict option might fail if an attack is underway.

4.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

A network administrator is configuring port security on a Cisco switch. The company security policy specifies that when a violation occurs, packets with unknown source addresses should be dropped and no notification should be sent. Which violation mode should be configured on the interfaces?

off

restrict

protect

shutdown

Answer explanation

On a Cisco switch, an interface can be configured for one of three violation modes, specifying the action to be taken if a violation occurs:

Protect - Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. There is no notification that a security violation has occurred.

Restrict - Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. In this mode, there is a notification that a security violation has occurred.

Shutdown - The interface immediately becomes error-disabled and the port LED is turned off.

5.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

What security benefit is gained from enabling BPDU guard on PortFast enabled interfaces?

preventing rogue switches from being added to the network

protecting against Layer 2 loops

enforcing the placement of root bridges

preventing buffer overflow attacks

Answer explanation

BPDU guard immediately error-disables a port that receives a BPDU. This prevents rogue switches from being added to the network. BPDU guard should only be applied to all end-user ports.

6.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN?

DTP spoofing

DHCP spoofing

VLAN double-tagging

DHCP starvation

Answer explanation

Spoofing DTP messages forces a switch into trunking mode as part of a VLAN-hopping attack, but VLAN double tagging works even if trunk ports are disabled. Changing the native VLAN from the default to an unused VLAN reduces the possibility of this type of attack. DHCP spoofing and DHCP starvation exploit vulnerabilities in the DHCP message exchange.​

7.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Media Image

Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

1

3

5

7

Answer explanation

The DHCP snooping configuration includes building the DHCP Snooping Binding Database and assigning necessary trusted ports on switches. A trusted port points to the legitimate DHCP servers. In this network design, because the DHCP server is attached to AS3, seven switch ports should be assigned as trusted ports, one on AS3 toward the DHCP server, one on DS1 toward AS3, one on DS2 toward AS3, and two connections on both AS1 and AS2 (toward DS1 and DS2), for a total of seven.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?