SWRE Unit 10

SWRE Unit 10

University

10 Qs

quiz-placeholder

Similar activities

Sem03-01- Redes Vlans

Sem03-01- Redes Vlans

University

13 Qs

SWRE Unit 6

SWRE Unit 6

University

10 Qs

LAN Security

LAN Security

9th Grade - Professional Development

12 Qs

Module 11: Switch Security Configuration

Module 11: Switch Security Configuration

University

10 Qs

Cisco 2, Module 4

Cisco 2, Module 4

University

15 Qs

Chapter 11 - Switch Security Configuration

Chapter 11 - Switch Security Configuration

University

15 Qs

II-BINS Quiz No. 4 (final term) late

II-BINS Quiz No. 4 (final term) late

University

15 Qs

Cisco 2, Module 1

Cisco 2, Module 1

University

12 Qs

SWRE Unit 10

SWRE Unit 10

Assessment

Quiz

Computers

University

Hard

Created by

Bruce (BCollier)

Used 13+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Cisco solution helps prevent ARP spoofing and ARP poisoning attacks?

  • Dynamic ARP Inspection

  • IP Source Guard

  • DHCP Snooping

  • Port Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mitigation technique would prevent rogue servers from providing false IPv6 configuration parameters to clients?

  • enabling RA Guard

  • enabling DHCPv6 Guard

  • implementing port security on edge ports

  • disabling CDP on edge ports

Answer explanation

DHCPv6 Guard is a feature designed to ensure that rogue DHCPv6 servers are not able to hand out addresses to clients, redirect client traffic, or starve out the DHCPv6 server and cause a DoS attack. DHCPv6 Guard requires a policy to be configured in DHCP Guard configuration mode, and DHCPv6 Guard is enabled on an interface-by-interface basis.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method to launch a VLAN hopping attack?

  • sending spoofed native VLAN information

  • sending spoofed IP addresses from the attacking host

  • introducing a rogue switch and enabling trunking

  • flooding the switch with MAC addresses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity analyst is using the macof tool to evaluate configurations of switches deployed in the backbone network of an organization. Which type of LAN attack is the analyst targeting during this evaluation?

  • VLAN hopping

  • DHCP spoofing

  • MAC address table overflow

  • VLAN double-tagging

Answer explanation

Macof is a network attack tool and is mainly used to flood LAN switches with MAC addresses.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network attack is mitigated by enabling BPDU guard?

  • rogue DHCP servers on a network

  • MAC address spoofing

  • CAM table overflow attacks

  • rogue switches on a network

Answer explanation

There are several recommended STP stability mechanisms to help mitigate STP manipulation attacks:
PortFast – used to immediately bring an interface configured as an access or trunk port to the forwarding state from a blocking state. Applied to all end-user ports.
BPDU guard – immediately error-disables a port that receives a BPDU. Applied to all end-user ports.The receipt of BPDUs may be part of an unauthorized attempt to add a switch to the network.
Root guard – prevents a switch from becoming the root switch. Applied to all ports where the root switch should not be located.
Loop guard – detects unidirectional links to prevent alternate or root ports from becoming designated ports. Applied to all ports that are or can become nondesignated.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator has found a user sending a double-tagged 802.1Q frame to a switch. What is the best solution to prevent this type of attack?

  • The native VLAN number used on any trunk should be one of the active data VLANs.

  • The VLANs for user access ports should be different VLANs than any native VLANs used on trunk ports.

  • Trunk ports should be configured with port security.

  • Trunk ports should use the default VLAN as the native VLAN number.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the AAA process, when will authorization be implemented?

  • Immediately after the determination of which resources a user can access

  • Immediately after an AAA client sends authentication information to a centralized server

  • Immediately after successful authentication against an AAA data source

  • Immediately after AAA accounting and auditing receives detailed reports

Answer explanation

AAA authorization is implemented immediately after the user is authenticated against a specific AAA data source.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?