Module 11 - Switch Security Configuration Flashcards

Review (15 cards)

1
Q

What is a recommended best practice when dealing with the native VLAN?

Use port security.

Turn off DTP.

Assign the same VLAN number as the management VLAN.

Assign it to an unused VLAN.

A

Assign it to an unused VLAN.

Topic 11.2.0 - Port security cannot be enabled on a trunk and trunks are the only types of ports that have a native VLAN. Even though turning DTP off on a trunk is a best practice, it does not have anything to do with native VLAN risks. To prevent security breaches that take advantage of the native VLAN, place the native VLAN in an unused VLAN other than VLAN 1. The management VLAN should also be an unused VLAN that is different from the native VLAN and something other than VLAN 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On what switch ports should PortFast be enabled to enhance STP stability?

Only ports that are elected as designated ports

All trunk ports that are not root ports

All end-user ports

Only ports that attach to a neighboring switch

A

All end-user ports

Topic 11.5.0 - PortFast will immediately bring an interface configured as an access or trunk port to the forwarding state from a blocking state, bypassing the listening and learning states. If configured on a trunk link, immediately transitioning to the forwarding state could lead to the formation of Layer 2 loops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco?

ip dhcp snooping

switchport port-security mac-address sticky mac-address

switchport port-security mac-address sticky

switchport port-security violation shutdown

shutdown

A

shutdown

Topic 11.1.0 - Unlike router Ethernet ports, switch ports are enabled by default. Cisco recommends disabling any port that is not used. The ip dhep snooping command globally enables DHCP snooping on a switch. Further configuration allows defining ports that can respond to DHCP requests. The switchport port-security command is used to protect the network from unidentified or unauthorized attachment of network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.)

Strong password on DHCP servers

DHCP server failover

Port security

DHCP snooping

Extended ACL

A

Port security
DHCP snooping

Topic 11.3.0 - In DHCP starvation attacks, an attacker floods the DHCP server with DHCP requests to use up all the available IP addresses that the DHCP server can issue.
In DHCP spoofing attacks, an attacker configures a fake DHCP server on the network so that it provides clients with false DNS server addresses. The port security feature can limit the number of dynamically learned MAC addresses per port or allow only known valid NICs to be connected via their specific MAC addresses. The DHCP snooping feature can identify the legitimate DHCP servers and block fake DHCP servers from issuing IP address information. These two features can help fight against DHCP attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the best way to prevent a VLAN hopping attack?

Use ISL encapsulation on all trunk links.

Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.

Use VLAN 1 as the native VLAN on trunk ports.

Disable STP on all nontrunk ports.

A

Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.

Topic 11.2.0 - VLAN hopping attacks rely on the attacker being able to create a trunk link with a switch. Disabling DTP and configuring user-facing ports as static access ports can help prevent these types of attacks. Disabling the Spanning Tree Protocol (STP) will not eliminate VLAN hopping attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which procedure is recommended to mitigate the chances of ARP spoofing?

Enable DAl on the management VLAN.

Enable IP Source Guard on trusted ports.

Enable DHCP snooping on selected VLANs.

Enable port security globally.

A

Enable DHCP snooping on selected VLANs.

Topic 11.4.0 - To mitigate the chances of ARP spoofing, these procedures are recommended:
- Implement protection against DHCP spoofing by enabling DHCP snooping globally.
- Enable DHCP snooping on selected VLANs.
- Enable DAl on selected VLANs.
- Configure trusted interfaces for DHCP snooping and ARP inspection. Untrusted ports are configured by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks? (Choose two.)

Unknown port
Trusted DHCP port
Untrusted port
Unauthorized port
Established DHCP port
Authorized DHCP port

A

Trusted DHCP port
Untrusted port

Topic 11.3.0 - DHCP snooping recognizes two types of ports on Cisco switches:
- Trusted DHCP ports - switch ports connecting to upstream DHCP servers
- Untrusted ports - switch ports connecting to hosts that should not be providing DHCP
server messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two commands can be used to enable PortFast on a switch? (Choose two.)

S1 (config-line)# spanning-tree portfast

S1 (config)# spanning-tree portfast default

S1 (config-if)# enable spanning-tree portfast

S1 (config)# enable spanning-tree portfast default

S1 (config-if)# spanning-tree portfast

A

S1 (config)# spanning-tree portfast default

S1 (config-if)# spanning-tree portfast

Topic 11.5.0 - PortFast can be configured on all nontrunking ports using the spanning-tree portfast default global configuration command. Alternatively, PortFast can be enabled on an interface using the spanning-tree portfast interface configuration command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?

Issue the shutdown command followed by the no shutdown command on the interface.

Issue the no switchport port-security violation shutdown command on the interface.

Reboot the switch.

Issue the no switchport port-security command, then re-enable port security.

A

Issue the shutdown command followed by the no shutdown command on the interface.

Topic 11.1.0 - If an interface that has been protected with port security goes into the err-disabled state, then a violation has occurred and the administrator should investigate the cause of the violation. Once the cause is determined, the administrator can issue the shutdown command followed by the no shutdown command to enable the interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network administrator is configuring DHCP snooping on a switch. Which configuration command should be used first?

ip dhcp snooping limit rate
ip dhcp snooping
ip dhcp snooping vlan
ip dhcp snooping trust

A

ip dhcp snooping

Topic 11.3.0 - The steps to enable DHCP snooping include these:
- Step 1. Enable DHCP snooping using the ip dhop snooping global configuration command.
- Step 2. On trusted ports, use the ip dhcp snooping trust interface configuration command.
- Step 3. Enable DHCP snooping by VLAN, or by a range of VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network administrator is configuring DAl on a switch with the command ip arp inspection validate dst-mac. What is the purpose of this configuration command?

To check the destination MAC address in the Ethernet header against the user-configured ARP ACLs

To check the destination MAC address in the Ethernet header against the MAC address table

To check the destination MAC address in the Ethernet header against the source MAC address in the ARP body

To check the destination MAC address in the Ethernet header against the target MAC address in the ARP body

A

To check the destination MAC address in the Ethernet header against the target MAC address in the ARP body

Topic 11.4.0 - DAl can be configured to check for both destination or source MAC and IP addresses:
- Destination MAC - Checks the destination MAC address in the Ethernet header against the target MAC address in the ARP body.
- Source MAC - Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.
- IP address - Checks the ARP body for invalid and unexpected IP addresses including addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.
* L

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which security feature should be enabled in order to prevent an attacker from overflowing the
MAC address table of a switch?

Port security
Root guard
Storm control
BPDU filter

A

Port security

Topic 11.1.0 - Port security limits the number of source MAC addresses allowed through a switch port. This feature can prevent an attacker from flooding a switch with many spoofed MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol?
DHCP spoofing
ARP poisoning
ARP spoofing
VLAN hopping

A

VLAN hopping

Topic 11.2.0 - Mitigating a VLAN hopping attack can be done by disabling Dynamic Trunking Protocol (DTP) and by setting the native VLAN of trunk links to VLANs not in
use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network administrator is configuring DAl on a switch. Which command should be used on the uplink interface that connects to a router?

ip arp inspection trust
ip arp inspection vlan
ip dhcp snooping
spanning-tree portfast

A

ip arp inspection trust

Topic 11.4.0 - In general, a router serves as the default gateway for the LAN or VLAN on the switch. Therefore, the uplink interface that connects to a router should be a trusted port for forwarding ARP requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command?

ROM
NVRAM
RAM
Flash

A

RAM

Topic 11.1.0 - When MAC addresses are automatically learned by using the sticky command option, the learned MAC addresses are added to the running configuration,
which is stored in RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly