Assessment System: Take Assessment - CCNAS Chapter 6 - CCNA Security: Implementing Network Security (Version 1.0)
Assessment System: Take Assessment - CCNAS Chapter 6 - CCNA Security: Implementing Network Security (Version 1.0)
Assessment System
00:38:52
Time Remaining:
SATA
iSCSI
IP PBX
FCIP
IDE
18 Which device supports the use of SPAN to enable monitoring of malicious activity?
Cisco NAC
Cisco IronPort
19 Which two measures are recommended to mitigate VLAN hopping attacks? (Choose two.)
Use a dedicated native VLAN for all trunk ports.
20 An administrator wants to prevent a rogue Layer 2 device from intercepting traffic from multiple VLANs on a network. Which two act
help mitigate this type of activity? (Choose two.)
Disable DTP on ports that require trunking.
Turn off trunking on all trunk ports and manually configure each VLAN as required on each port.
21 How many Cisco Security Agent clients can one Management Center for CSA console support?
1,000
10,000
100,000
1,000,000
Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.
Close Window
Assessment System
00:38:21
Time Remaining:
1 Which attack relies on the default automatic trunking configuration on most Cisco switches?
LAN storm attack
2 If a switch is configured with the storm-control command and the action shutdown and action trap parameters, which two action
does the switch take when a storm occurs on a port? (Choose two.)
The port is disabled.
3 Which three statements are true regarding SPAN and RSPAN? (Choose three.)
SPAN can send a copy of traffic to a port on another switch.
SPAN can be configured to send a copy of traffic to a destination port on the same switch.
SPAN can copy traffic on a source port or source VLAN to a destination port on the same switch.
RSPAN is required to copy traffic on a source VLAN to a destination port on the same switch.
RSPAN can be used to forward traffic to reach an IDS that is analyzing traffic for malicious behavior.
DTP
ISL
802.1q
5 When configuring a switch port for port security, what is the default violation mode?
protect
reset
restrict
shutdown
Refer to the exhibit. Based on the output generated by the show monitor session 1 command, how will SPAN operate on the switc
All traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to FastEthernet 0/1.
All traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1.
Native VLAN traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1.
Native VLAN traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to FastEthernet 0/1.
7 Which technology is used to protect the switched infrastructure from problems caused by receiving BPDUs on ports that should not
receiving them?
RSPAN
PortFast
Root guard
Loop guard
BPDU guard
8 Which two elements are part of the Cisco strategy for addressing endpoint security? (Choose two.)
policy compliance using products such as Cisco NAC
10 What happens when the MAC address notification feature is enabled on a switch?
An SDEE alert is generated, and the switch resets the interface when an invalid MAC address is detected.
An STP multicast notification packet is forwarded to all switches any time a change in the network topology is detected.
A port violation occurs when a MAC address outside of the range of allowed addresses transmits traffic over a secure port.
An SNMP trap is sent to the network management system whenever a new MAC address is added to or an old address is dele
from the forwarding tables.
11 With IP voice systems on data networks, which two types of attacks target VoIP specifically? (Choose two.)
CoWPAtty
Kismet
SPIT
virus
vishing
VLAN hopping
STP manipulation
13 Which Cisco endpoint security product helps maintain network stability by providing posture assessment, quarantining of noncompli
systems, and remediation of noncompliant systems?
Cisco Access Control Server
14 Which three switch security commands are required to enable port security on a port so that it will dynamically learn a single MAC
address and disable the port if a host with any other MAC address is connected? (Choose three.)
switchport mode access
switchport port-security
An attacker alters the MAC address of his host to match another known MAC address of a target host.
An attacker alters the MAC address of the switch to gain access to the network device from a rogue host device.
An attacker floods the MAC address table of a switch so that the switch can no longer filter network access based on MAC
addresses.
Close Window
All contents copyright 1992-2010 Cisco Systems, Inc. Privacy Statement and Trademarks.