CCNP 300-115 TOPIC SEGURIDAD

Description

topic security
Alexander Gomez
Quiz by Alexander Gomez, updated more than 1 year ago
Alexander Gomez
Created by Alexander Gomez over 7 years ago
104
0

Resource summary

Question 1

Question
A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping database. What is the solution to avoid the snooping database from being rebuilt after every device reboot?
Answer
  • A DHCP snooping database agent should be configured.
  • Enable DHCP snooping for all VLANs that are associated with the switch.
  • Disable Option 82 for DHCP data insertion.
  • Use IP Source Guard to protect the DHCP binding table entries from being lost upon rebooting.
  • Apply ip dhcp snooping trust on all interfaces with dynamic addresses.

Question 2

Question
Which portion of AAA looks at what a user has access to?
Answer
  • authorization
  • authentication
  • accounting
  • auditing

Question 3

Question
Which command creates a login authentication method named “login” that will primarily use RADIUS and fail over to the local user database?
Answer
  • (config)# aaa authentication login default radius local
  • (config)# aaa authentication login login radius local
  • (config)# aaa authentication login default local radius
  • (config)# aaa authentication login radius local

Question 4

Question
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP snooping. For more protection against malicious attacks, the network team is considering enabling dynamic ARP inspection alongside DHCP snooping. Which solution ensures that the server maintains network reachability in the future?
Answer
  • Disable DHCP snooping information option.
  • Configure a static DHCP snooping binding entry on the switch.
  • Trust the interface that is connected to the server with the ip dhcp snooping trust command.
  • Verify the source MAC address of all untrusted interfaces with ip dhcp snooping verify macaddress command.

Question 5

Question
A network engineer wants to ensure Layer 2 isolation of customer traffic using a private VLAN. Which configuration must be made before the private VLAN is configured?
Answer
  • Disable VTP and manually assign VLANs.
  • Ensure all switches are configured as VTP server mode.
  • Configure VTP Transparent Mode.
  • Enable VTP version 3.

Question 6

Question
DHCP snooping and IP Source Guard have been configured on a switch that connects to several client workstations. The IP address of one of the workstations does not match any entries found in the DHCP binding database. Which statement describes the outcome of this scenario?
Answer
  • Packets from the workstation will be rate limited according to the default values set on the switch.
  • The interface that is connected to the workstation in question will be put into the errdisabled state.
  • Traffic will pass accordingly after the new IP address is populated into the binding database.
  • The packets originating from the workstation are assumed to be spoofed and will be discarded.

Question 7

Question
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the ip verify source port-security command is configured under the interfaces that connect to all DHCP clients on the switch. However, clients are not receiving an IP address via the DHCP server. Which option is the cause of this issue?
Answer
  • The DHCP server does not support information option 82.
  • The DHCP client interfaces have storm control configured.
  • Static DHCP bindings are not configured on the switch.
  • DHCP snooping must be enabled on all VLANs, even if they are not utilized for dynamic address allocation.

Question 8

Question
A switch is added into the production network to increase port capacity. A network engineer is configuring the switch for DHCP snooping and IP Source Guard, but is unable to configure ip verify source under several of the interfaces. Which option is the cause of the problem?
Answer
  • The local DHCP server is disabled prior to enabling IP Source Guard.
  • The interfaces are configured as Layer 3 using the no switchport command.
  • No VLANs exist on the switch and/or the switch is configured in VTP transparent mode
  • The switch is configured for sdm prefer routing as the switched database management template.
  • The configured SVIs on the switch have been removed for the associated interfaces.

Question 9

Question
The command storm-control broadcast level 75 65 is configured under the switch port connected to the corporate mail server. In which three ways does this command impact the traffic? (Choose three.)
Answer
  • SNMP traps are sent by default when broadcast traffic reaches 65% of the lower-level threshold.
  • The switchport is disabled when unicast traffic reaches 75% of the total interface bandwidth.
  • The switch resumes forwarding broadcasts when they are below 65% of bandwidth.
  • Only broadcast traffic is limited by this particular storm control configuration.
  • Multicast traffic is dropped at 65% and broadcast traffic is dropped at 75% of the total interface bandwidth
  • The switch drops broadcasts when they reach 75% of bandwidth.

Question 10

Question
After port security is deployed throughout an enterprise campus, the network team has been overwhelmed with port reset requests. They decide to configure the network to automate the process of re-enabling user ports. Which command accomplishes this task?
Answer
  • switch(config)# errdisable recovery interval 180
  • switch(config)# errdisable recovery cause psecure-violation
  • switch(config)# switchport port-security protect
  • switch(config)# switchport port-security aging type inactivity
  • switch(config)# errdisable recovery cause security-violation

Question 11

Question
The network monitoring application alerts a network engineer of a client PC that is acting as a rogue DHCP server. Which two commands help trace this PC when the MAC address is known? (Choose two.)
Answer
  • switch# show mac address-table
  • switch# show port-security
  • switch# show ip verify source
  • switch# show ip arp inspection
  • switch# show mac address-table address <mac address>

Question 12

Question
While troubleshooting a network outage, a network engineer discovered an unusually high level of broadcast traffic coming from one of the switch interfaces. Which option decreases consumption of bandwidth used by broadcast traffic?
Answer
  • storm control
  • SDM routing
  • Cisco IOS parser
  • integrated routing and bridging
  • Dynamic ARP Inspection

Question 13

Question
Which command globally enables AAA on a device?
Answer
  • aaa new-model
  • aaa authentication
  • aaa authorization
  • aaa accounting

Question 14

Question
Which AAA Authorization type includes PPP, SLIP, and ARAP connections?
Answer
  • network
  • IP mobile
  • EXEC
  • auth-proxy

Question 15

Question
Which authentication service is needed to configure 802.1x?
Answer
  • RADIUS with EAP Extension
  • TACACS+
  • RADIUS with CoA
  • RADIUS using VSA

Question 16

Question
Refer to the exhibit. Which login credentials are required when connecting to the console port in this output?
Answer
  • none required
  • username cisco with password cisco
  • no username with password linepass
  • login authentication default

Question 17

Question
Refer to the exhibit. When a network administrator is attempting an SSH connection to the device, in which order does the device check the login credentials?
Answer
  • RADIUS server, local username, line password
  • RADIUS server, line password, local username
  • Line password, local username, RADIUS server
  • Line password, RADIUS server, local username

Question 18

Question
Which type of information does the DHCP snooping binding database contain?
Answer
  • untrusted hosts with leased IP addresses
  • trusted hosts with leased IP addresses
  • untrusted hosts with available IP addresses
  • trusted hosts with available IP addresses

Question 19

Question
Which switch feature determines validity based on IP-to-MAC address bindings that are stored in a trusted database?
Answer
  • Dynamic ARP Inspection
  • storm control
  • VTP pruning
  • DHCP snooping

Question 20

Question
Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP server?
Answer
  • ip dhcp snooping trust
  • ip dhcp snooping
  • ip dhcp trust
  • ip dhcp snooping information

Question 21

Question
Which private VLAN access port belongs to the primary VLAN and can communicate with all interfaces, including the community and isolated host ports?
Answer
  • promiscuous port
  • isolated port
  • community port
  • trunk port

Question 22

Question
Which private VLAN can have only one VLAN and be a secondary VLAN that carries unidirectional traffic upstream from the hosts toward the promiscuous ports and the gateway?
Answer
  • isolated VLAN
  • primary VLAN
  • community VLAN
  • promiscuous VLAN

Question 23

Question
Which database is used to determine the validity of an ARP packet based on a valid IP-to-MAC address binding?
Answer
  • DHCP snooping database
  • dynamic ARP database
  • dynamic routing database
  • static ARP database

Question 24

Question
When IP Source Guard with source IP filtering is enabled on an interface, which feature must be enabled on the access VLAN for that interface?
Answer
  • DHCP snooping
  • storm control
  • spanning-tree portfast
  • private VLAN

Question 25

Question
Which switch feature prevents traffic on a LAN from being overwhelmed by continuous multicast or broadcast traffic?
Answer
  • storm control
  • port security
  • VTP pruning
  • VLAN trunking

Question 26

Question
Which command would a network engineer apply to error-disable a switchport when a packet-storm is detected?
Answer
  • router(config-if)#storm-control action shutdown
  • router(config-if)#storm-control action trap
  • router(config-if)#storm-control action error
  • router(config-if)#storm-control action enable

Question 27

Question
A network engineer configures port security and 802.1x on the same interface. Which option describes what this configuration allows?
Answer
  • It allows port security to secure the MAC address that 802.1x authenticates.
  • It allows port security to secure the IP address that 802.1x authenticates.
  • It allows 802.1x to secure the MAC address that port security authenticates.
  • It allows 802.1x to secure the IP address that port security authenticates.

Question 28

Question
Which feature describes MAC addresses that are dynamically learned or manually configured, stored in the address table, and added to the running configuration?
Answer
  • sticky
  • dynamic
  • static
  • secure

Question 29

Question
On which interface can port security be configured?
Answer
  • static trunk ports
  • destination port for SPAN
  • EtherChannel port group
  • dynamic access point

Question 30

Question
When you configure private VLANs on a switch, which port type connects the switch to the gateway router?
Answer
  • promiscuous
  • community
  • isolated
  • trunked

Question 31

Question
When you configure a private VLAN, which type of port must you configure the gateway router port as?
Answer
  • promiscuous port
  • isolated port
  • community port
  • access port
Show full summary Hide full summary

Similar

Salud y seguridad
Rafa Tintore
Seguridad alimenticia
Rafa Tintore
CCNP 300-115 SWITCH VTP LAB
Alexander Gomez
CCNP 300-115 Topic 3, Infrastructure Services
Alexander Gomez
GS-2. LAS GUARDIAS DE SEGURIDAD
antonio del valle
GS-1. GUARDIAS DE ORDEN Y GUARDIAS DE LOS SERVICIOS
antonio del valle
Seguridad Informática
M Siller
Mapa Conceptual, Seguridad Social en Colombia
mafe__09
El sistema de seguridad social integral
vanessa correa
Generalidades de la Biología Celular, la evolución y diversidad de los seres vivos. Diana Castro
diana castro
PREVENCIÓN DE RIESGOS LABORALES
GGPrevencioni