Professional Documents
Culture Documents
This post is about answer for CCNA Security Chapter 6 Test. The
questions displayed in this post are based on CCNAS v1.1. All the answers
be treated?
CoWPAtty
Kismet
SPIT
Virus nnn
2017-12-06 Huawei Proprietary - Restricted Distribution Page1, Total10
Document Title Security Level
vishing
An attacker gains access to another host and masquerades as the rightful user
of that device.
An attacker alters the MAC address of his host to match another known MAC address of a
target host.
An attacker alters the MAC address of the switch to gain access to the
An attacker floods the MAC address table of a switch so that the switch can
Fibre Channel
SATA
iSCSI
IP PBX
FCIP
IDE
Refer to the exhibit. What action will the switch take when the maximum
number of secure MAC addresses has reached the allowed limit on the
Fa0/2 port?
Packets with unknown source addresses are dropped, but notification of the
The VLAN that Fa0/2 is on is set to error-disabled and all traffic on the
VLAN is stopped.
The interface immediately becomes error-disabled and the port LED is turned
off.
Which software tool can a hacker use to flood the MAC address table
of a switch?
macof
Cisco CCP
protocol analyzer
Which two methods are used to mitigate VLAN attacks? (Choose two.)
and disable the port if a host with any other MAC address is connected?
(Choose three.)
switchport port-security
2017-12-06 Huawei Proprietary - Restricted Distribution Page5, Total10
Document Title Security Level
digital certificate
digital signature
Why are traditional network security perimeters not suitable for the
networks.
These devices pose no risk to security as they are not directly connected to
C-Series
M-Series
S-Series
SenderBase-Series
malware?
C-Series
M-Series
S-Series
SenderBase-Series
What is the goal of the Cisco NAC framework and the Cisco NAC
appliance?
to ensure that only hosts that are authenticated and have had their security posture
examined and approved are permitted onto the network
to monitor data from the company to the ISP in order to build a real-time
database of current spam threats from both internal and external sources
remote device against the defined network policies, what feature is being
used?
posture assessment
quarantining of noncompliant systems
switchport block
switchport nonnegotiate
switchport protected
All data traffic that passes between protected ports must be forwarded
All data traffic that passes between protected ports must be forwarded through a Layer 3
device.
switch?
network?
The device has been updated with the latest virus protection software.
The user does not plan on accessing the corporate network when attached to