Check answers here:
Modules 13 – 14: Layer 2 and Endpoint Security Group Exam Answers Full
Quiz-summary
0 of 26 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
Information
Network Security (Version1.0) Modules 13 – 14: Layer 2 and Endpoint Security Group Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 26 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- Answered
- Review
-
Question 1 of 26
1. Question
1 pointsWhy are traditional network security perimeters not suitable for the latest consumer-based network endpoint devices?Correct
Incorrect
Hint
Traditional network security has two major focuses: (1) end point protection using antivirus software and enabling the personal firewall, and (2) network border protection with firewalls, proxy servers, and network packet scanning devices or software. This type of protection is not suited for the new network devices that are mobile, frequently access cloud storage, and may be a personal device. -
Question 2 of 26
2. Question
1 pointsWhat two internal LAN elements need to be secured? (Choose two.)Correct
Incorrect
Hint
Internal network protection is just as important as securing the network perimeter. Internal LAN elements can be broken up into endpoints and network infrastructure devices. Common endpoints include laptops, desktops, servers, and IP phones. LAN infrastructure devices include switches and access points. -
Question 3 of 26
3. Question
1 pointsWhat are two examples of traditional host-based security measures? (Choose two.)Correct
Incorrect
Hint
Traditional host-based security measures include antivirus/antimalware software, host-based IPS, and host-based firewall. Antivirus and antimalware software detects and mitigates viruses and malware. A host-based IPS is used to monitor and report on the system configuration and application activity, security events, policy enforcement, alerting, and rootkit detection. A host-based firewall restricts incoming and outgoing connections for a particular host. -
Question 4 of 26
4. Question
1 pointsIn an 802.1x deployment, which device is a supplicant?Correct
Incorrect
Hint
In 802.1x, a supplicant is the end-user device (such as a laptop) that is attempting to attach to the WLAN. -
Question 5 of 26
5. Question
1 pointsA company implements 802.1X security on the corporate network. A PC is attached to the network but has not authenticated yet. Which 802.1X state is associated with this PC?Correct
Incorrect
Hint
When a port is configured for 802.1X, the port starts in the unauthorized state and stays that way until the client has successfully authenticated. -
Question 6 of 26
6. Question
1 pointsAn 802.1X client must authenticate before being allowed to pass data traffic onto the network. During the authentication process, between which two devices is the EAP data encapsulated into EAPOL frames? (Choose two.)Correct
Incorrect
Hint
When a client supplicant is starting the 802.1X message exchange, an EAPOL-Start message is sent between the supplicant and the authenticator, which is the switch. EAP data between the supplicant and the authenticator is encapsulated in EAPOL frames. -
Question 7 of 26
7. Question
1 pointsWhich command is used as part of the 802.1X configuration to designate the authentication method that will be used?Correct
Incorrect
Hint
The aaa authentication dot1x default group radius command specifies that RADIUS is used as the method for 802.1X port-based authentication. -
Question 8 of 26
8. Question
1 pointsWhat is involved in an IP address spoofing attack?Correct
Incorrect
Hint
In an IP address spoofing attack, the IP address of a legitimate network host is hijacked and used by a rogue node. This allows the rogue node to pose as a valid node on the network. -
Question 9 of 26
9. Question
1 pointsAt which layer of the OSI model does Spanning Tree Protocol operate?Correct
Incorrect
Hint
Spanning Tree Protocol (STP) is a Layer 2 technology for preventing Layer 2 loops between redundant switch paths. -
Question 10 of 26
10. Question
1 pointsA network administrator uses the spanning-tree loopguard default global configuration command to enable Loop Guard on switches. What components in a LAN are protected with Loop Guard?Correct
Incorrect
Hint
Loop Guard can be enabled globally using the spanning-tree loopguard default global configuration command. This enables Loop Guard on all point-to-point links. -
Question 11 of 26
11. Question
1 pointsWhich procedure is recommended to mitigate the chances of ARP spoofing?Correct
Incorrect
Hint
To mitigate the chances of ARP spoofing, these procedures are recommended:- Implement protection against DHCP spoofing by enabling DHCP snooping globally.
- Enable DHCP snooping on selected VLANs.
- Enable DAI on selected VLANs.
- Configure trusted interfaces for DHCP snooping and ARP inspection. Untrusted ports are configured by default.
-
Question 12 of 26
12. Question
1 pointsWhich two ports can send and receive Layer 2 traffic from a community port on a PVLAN? (Choose two.)Correct
Incorrect
Hint
Community ports can send and receive information with ports within the same community, or with a promiscuous port. Isolated ports can only communicate with promiscuous ports. Promiscuous ports can talk to all interfaces. PVLAN edge protected ports only forward traffic through a Layer 3 device to other protected ports. -
Question 13 of 26
13. Question
1 pointsWhich protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?Correct
Incorrect
Hint
Telnet uses plain text to communicate in a network. The username and password can be captured if the data transmission is intercepted. SSH encrypts data communications between two network devices. TFTP and SCP are used for file transfer over the network. SNMP is used in network management solutions. -
Question 14 of 26
14. Question
1 pointsHow can DHCP spoofing attacks be mitigated?Correct
Incorrect
Hint
One of the procedures to prevent a VLAN hopping attack is to disable DTP (auto trunking) negotiations on nontrunking ports. DHCP spoofing attacks can be mitigated by using DHCP snooping on trusted ports. The ip verify source interface configuration command is used to enable IP Source Guard on untrusted ports to protect against MAC and IP address spoofing. -
Question 15 of 26
15. Question
1 pointsRefer to the exhibit. The network administrator is configuring the port security feature on switch SWC. The administrator issued the command show port-security interface fa 0/2 to verify the configuration. What can be concluded from the output that is shown? (Choose three.)Correct
Incorrect
Hint
Because the security violation count is at 0, no violation has occurred. The system shows that 3 MAC addresses are allowed on port fa0/2, but only one has been configured and no sticky MAC addresses have been learned. The port is up because of the port status of secure-up. The violation mode is what happens when an unauthorized device is attached to the port. A port must be in access mode in order to activate and use port security. -
Question 16 of 26
16. Question
1 pointsTwo devices that are connected to the same switch need to be totally isolated from one another. Which Cisco switch security feature will provide this isolation?Correct
Incorrect
Hint
The PVLAN Edge feature does not allow one device to see traffic that is generated by another device. Ports configured with the PVLAN Edge feature are also known as protected ports. BPDU guard prevents unauthorized connectivity to a wired Layer 2 switch. SPAN is port mirroring to capture data from one port or VLAN and send that data to another port. DTP (Dynamic Trunking Protocol) is automatically enabled on some switch models to create a trunk if the attached device is configured for trunking. Cisco recommends disabling DTP as a best practice. -
Question 17 of 26
17. Question
1 pointsWhat is the behavior of a switch as a result of a successful CAM table attack?Correct
Incorrect
Hint
As a result of a CAM table attack, a switch can run out of memory resources to store MAC addresses. When this happens, no new MAC addresses can be added to the CAM table and the switch will forward all received frames to all other ports. This would allow an attacker to capture all traffic that is flooded by the switch. -
Question 18 of 26
18. Question
1 pointsWhich protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?Correct
Incorrect
Hint
802.1x is an IEEE standard that defines port-based access control. By authenticating each client that attempts to connect to the LAN, 802.1x provides protection from unauthorized clients. -
Question 19 of 26
19. Question
1 pointsWhat device is considered a supplicant during the 802.1X authentication process?Correct
Incorrect
Hint
The devices involved in the 802.1X authentication process are as follows:- The supplicant, which is the client that is requesting network access
- The authenticator, which is the switch that the client is connecting to and that is actually controlling physical network access
- The authentication server, which performs the actual authentication
-
Question 20 of 26
20. Question
1 pointsWhich term describes the role of a Cisco switch in the 802.1X port-based access control?Correct
Incorrect
Hint
802.1X port-based authentication defines specific roles for the devices in the network:- Client (Supplicant) – The device that requests access to LAN and switch services
- Switch (Authenticator) – Controls physical access to the network based on the authentication status of the client
- Authentication server – Performs the actual authentication of the client
-
Question 21 of 26
21. Question
1 pointsWhat type of data does the DLP feature of Cisco Email Security Appliance scan in order to prevent customer data from being leaked outside of the company?Correct
Incorrect
Hint
Cisco ESAs control outbound messages through data-loss prevention (DLP), email encryption, and optional integration with the RSA Enterprise Manager. This control helps ensure that the outbound messages comply with industry standards and are protected in transit. -
Question 22 of 26
22. Question
1 pointsWhat is the goal of the Cisco NAC framework and the Cisco NAC appliance?Correct
Incorrect
Hint
The NAC framework uses the Cisco network infrastructure and third-party software to ensure the wired and wireless endpoints that want to gain access to the network adheres to the requirements defined by the security policy. The Cisco NAC Appliance is the device that enforces security policy compliance. -
Question 23 of 26
23. Question
1 pointsto provide protection against a wide variety of web-based threats, including adware, phishing attacks, Trojan horses, and wormsCorrect
Incorrect
Hint
Cisco provides solutions to help mitigate Layer 2 attacks including:- IP Source Guard (IPSG) – prevents MAC and IP address spoofing attacks
- Dynamic ARP Inspection (DAI) – prevents ARP spoofing and ARP poisoning attacks
- DHCP Snooping – prevents DHCP starvation and SHCP spoofing attacks
- Port Security – prevents many types of attacks including MAC table overflow attacks and DHCP starvation attacks
-
Question 24 of 26
24. Question
1 pointsWhat Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol?Correct
Incorrect
Hint
Mitigating a VLAN hopping attack can be done by disabling Dynamic Trunking Protocol (DTP) and by setting the native VLAN of trunk links to VLANs not in use. -
Question 25 of 26
25. Question
1 pointsWhat is the result of a DHCP starvation attack?Correct
Incorrect
Hint
DCHP starvation attacks are launched by an attacker with the intent to create a DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER messages to lease the entire pool of available IP addresses, thus denying them to legitimate hosts. -
Question 26 of 26
26. Question
1 pointsA network administrator is configuring DAI on a switch with the command ip arp inspection validate dst-mac . What is the purpose of this configuration command?Correct
Incorrect
Hint
DAI can be configured to check for both destination or source MAC and IP addresses:- Destination MAC – Checks the destination MAC address in the Ethernet header against the target MAC address in the ARP body.
- Source MAC – Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.
- IP address – Checks the ARP body for invalid and unexpected IP addresses including addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.