Professional Documents
Culture Documents
Close Window
Assessment System
T
7182995
o
p
Time Remaining:
o
f 01:59:43
F
o
r Bottom of Form
m
A port can be configured to act as a source and destination port for a single SPAN session.
Both Layer 2 and Layer 3 switched ports can be configured as source or destination ports for
a single SPAN session.
Port channel interfaces (EtherChannel) can be configured as source and destination ports for
a single SPAN session.
Top of Form
Refer to the exhibit. Which statement is true about the local SPAN configuration on switch
SW1?
The SPAN session transmits to a device on port Fa3/21 a copy of all traffic that is monitored
on port Fa3/1.
The SPAN session transmits to a device on port Fa3/21 a copy of all traffic that is monitored
on port Fa3/1, but only if port Fa3/1 is configured in VLAN 10.
The SPAN session transmits to a device on port Fa3/21 a copy of all traffic that is monitored
on port Fa3/1, but only if port Fa3/1 is configured as trunk.
The SPAN session transmits to a device on port Fa3/21 only a copy of unicast traffic that is
monitored on port Fa3/1. All multicast and BPDU frames will be excluded from the
monitoring process.
Top of Form
Refer to the exhibit. Which statement is true about the VSPAN configuration on switch SW1?
The VSPAN session that is configured on port Fa3/4 can monitor only the ingress traffic for
any of the VLANs.
The VSPAN session that is configured on port Fa3/4 can monitor only the egress traffic for
any of the VLANs.
Port Fa3/4 must be associated with VLAN 10 or VLAN 20 in order to monitor the traffic for
any of the VLANs.
The VSPAN session transmits a copy of the ingress traffic for VLAN 10 and the egress
traffic for VLAN 20 out interface Fa3/4.
Top of Form
Which configuration guideline applies to using the capture option in VACL?
Capture ports transmit traffic that belongs to all VLANs.
The capture port captures all packets that are received on the port.
The capture port needs to be in the spanning-tree forwarding state for the VLAN.
All access ports on a switch are configured with the administrative mode of dynamic
auto. An attacker, connected to one of the ports, sends a malicious DTP frame.
What is the intent of the attacker?
VLAN hopping
Top of Form
Refer to the exhibit. A network engineer is securing a network against DHCP spoofing attacks. On all
switches, the engineer applied the ip dhcp snooping command and enabled DHCP snooping on all
VLANs with the ip dhcp snooping vlan command. What additional step should be taken to configure
the security required on the network?
Issue the ip dhcp snooping trust command on all uplink interfaces on SW1, SW2 and SW3.
Issue the ip dhcp snooping trust command on all interfaces on SW2 and SW3.
Issue the ip dhcp snooping trust command on all interfaces on SW1, SW2, and SW3.
Issue the ip dhcp snooping trust command on all interfaces on SW1, SW2, and SW3 except
interface Fa0/1 on SW1.
Bottom of Form
Top of Form
Which countermeasure can be implemented to determine the validity of an ARP packet, based on
the valid MAC-address-to-IP address bindings stored in a DHCP snooping database?
DHCP spoofing
MAC snooping
Top of Form
How should unused ports on a switch be configured in order to prevent VLAN hopping attacks?
Configure them with the UDLD feature.
Configure them as access ports and associate them with an unused VLAN.
Top of Form
Refer to the exhibit. Given the configuration on the ALSwitch, what is the end result?
forces all hosts that are attached to a port to authenticate before being allowed access to the network
disables 802.1x port-based authentication and causes the port to allow normal traffic without
authenticating the client
enables 802.1x authentication on the port
globally disables 802.1x authentication
Bottom of Form
Top of Form
Refer to the exhibit. Network policy dictates that security functions should be administered using AAA.
Which configuration would create a default login authentication list that uses RADIUS as the first
authentication method, the enable password as the second method, and the local database as the final
method?
SW-1(config)# aaa new-model
SW-1(config)# radius-server host 10.10.10.12 key secret
SW-1(config)# aaa authentication default group-radius local
SW-1(config)# aaa new-model
SW-1(config)# radius-server host 10.10.10.12 key secret
SW-1(config)# aaa authentication default group-radius enable local
SW-1(config)# aaa new-model
SW-1(config)# radius-server host 10.10.10.12 key secret
SW-1(config)# aaa authentication login default group radius enable local
SW-1(config)# aaa new-model
SW-1(config)# radius server host 10.10.10.12 key secret
SW-1(config)# aaa authentication login default group radius enable local none
SW-1(config)# aaa new-model
SW-1(config)# radius server host 10.10.10.12 key secret
SW-1(config)# aaa authentication login default group-radius enable local none
Bottom of Form
Top of Form
Refer to the exhibit. A switch is being configured to support AAA authentication on the console
connection. Given the information in the exhibit, which three statements are correct? (Choose three.)
The authentication login admin line console command is required.
Place all unused ports into a common VLAN (not VLAN 1).
Top of Form
What are two purposes for an attacker launching a MAC table flood? (Choose two.)
to initiate a man-in-the-middle attack
to initiate a denial of service (DoS) attack
Refer to the exhibit. After the configuration has been applied to ACSw22, frames
that are bound for the node on port FastEthernet 0/1 are periodically being dropped.
What should be done to correct the issue?
Change the port speed to speed auto with the interface configuration mode.
Top of Form
What is the function of the 6500 Network Analysis Module?
monitors traffic on ingress ports
gathers multilayer information from data flows that pass through the switch
root guard
Private VLANs
DHCP snooping
Top of Form
What advantage for monitoring traffic flows does using VACLs with the capture option offer over
using SPAN?
VLAN ACLs can be used to capture denied traffic.
Top of Form
What Cisco tool can be used to monitor events happening in the switch?
Embedded Event Manager