cisco 10-13 Flashcards

(70 cards)

1
Q

What protocols are used by AAA to authenticate users against a central database of usernames and passwords

A

RADIUS, TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication method that stores usernames and passwords in the router and is ideal for small networks

A

local AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Component of AAA used to determine which resources a user can access and which operations the user is allowed to perform

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Component of AAA used to allow an administrator to track individuals who access network resources and any changes made

A

accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What device is considered a supplicant during the 802.1x authentication process

A

the client that is requesting authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which access control component controls what users can do on the network

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access control component that audits what users actions are performed on the network

A

accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control component that restricts LAN access through publicly accessible switch ports

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access control component that indicates success or failure of a client-requested service with a PASS or FAIL message

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access control component that is based on device roles of supplicant, authenticator, and authentication server

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two cisco solutions help prevent DHCP starvation attacks

A

DHCP snooping, port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the result of a MAC table flooding attack

A

the switch will begin broadcasting traffic out of all ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which feature on a switch makes it vulnerable to VLAN hopping attacks

A

the automatic trunking port feature enabled by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What makes switches vulnerable to double tagging attacks

A

native vlan of trunking port being same as user VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Result of DHCP starvation attack

A

legitimate clients are unable to lease IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Best practice for CDP and LLDP

A

disable them where they aren’t required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which port security configuration allows dynamically learned mac addresses to be saved in running config

A

sticky secure mac address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which set of commands limits learned MAC addresses to 2, stores them in running config, and shuts the port down if there are more

A

switchport port-security, switchport port-security max 2, switchport port-security mac-address sticky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens with default port security when an extra mac is added

A

interface is shut down and log file is made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Default violation mode in port security

A

shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Violation mode where packets are dropped without log message

A

protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Exhibit of show port-security int f 0/. What can be determined?

A

Port violation mode is the default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Exhibit where Fa0/2 is down. Why?

A

MAC of PC1 configured on S1 isn’t the right MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Vlan hopping attack prevented by designating unused VLAN as native VLAN

A

VLAN double-tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
3 Techniques to mitigate VLAN attacks
disable DTP, enable trunking manually, set native vlan to unused vlan
26
What is the effect of ip dhcp snooping limit rate 6
port can receive 6 DHCP discover messages per second
27
Purpose of ip arp inspection validate src-mac
checks source MAC in ethernet header against sender MAC in ARP body
28
Command to enable portfast on all ports by default
spanning-tree portfast default
29
Security benefit gained from enabling BPDU guard on PortFast-enabled devices
prevents rogue switches from being added to the network
30
Commands to enable BPDU guard
spanning-tree bpduguard enable (if), spanning-tree portfast bpduguard default (global)
31
Wireless network that uses transmitters to provide coverage over an extensive geographic area
WWAN
32
Wireless network that uses Bluetooth/ZigBee
WPAN
33
Wireless network over large urban region
WMAN
34
Wireless network for home network
WLAN
35
Wireless network that uses devices mounted on buildings
WMAN
36
Wireless network for global communication
WWAN
37
Wireless network for 300 ft
WLAN
38
Wireless network w/ 802.11 and uses 2.4/5ghz
WLAN
39
Wireless network suitable for city
WMAN
40
Wireless network w/ 20-30ft transmitters
WPAN
41
IEEE Standard 802.15
Bluetooth
42
802.11 standards that operate only in 5ghz range
802.11a, 802.11ac
43
802.11 standard that has <1.3gb/s data range and is backwards compatible
802.11ac
44
Wireless antenna best for large open spaces (hallways, conference rooms)
omnidirectional
45
Wireless network topology used by network engineers to provide wireless network for entire college building
infrastructure
46
Access point mode where hosts don't see it in list of networks
Active mode
47
Access point mode where SSID is broadcast
passive mode
48
Management frame regularly broadcast by AP
beacons
49
Two methods used by wireless NIC to discover AP
transmitting probe request, receiving broadcast beacon frame
50
What does CAPWAP do
provides encapsulation and forwarding of wireless user traffic between AP and WLAN controller
51
Purpose of adjusting channel on wireless router
avoid interference from nearby wireless devices
52
Method to enhance performance of 802.11n wireless network
split traffic between 2.4 and 5 gHZ bands
53
Wireless security risk created by microwave ovens
accidental interference
54
Advantage of SSID cloaking
clients will have to manually identify the SSID to connect to the network
55
Wireless security mode that requires a RADIUS server
enterprise
56
What ports does radius use
1812, 1813, 1645, 1646
57
First security measure that should be applied on wireless router
change default username & password
58
3 parameters to change on home wireless ap
SSID, ap password, wireless network password
59
Which service is used on wireless router (that assigns IPs to hosts in the 10.10.10.0 network) to allow hosts to access the internet
NAT
60
Wireless router service that can be used to prioritize network traffic
QoS
61
Cisco 3504 WLC dashboard which option provides access to full menu of features
Advanced
62
Which protocol can be used to monitor the network
SNMP
63
Which server provides ability to authenticate with usernames and passwords
RADIUS
64
Purpose of shared secret password on WLC
used to encrypt messages between WLC and RADIUS server
65
What tab allows configuration of WLAN security options such as WPA2 on the summary page (Advanced > Summary)
WLANs
66
What is required before creating a new WLAN on WLC
create new VLAN
67
Troubleshooting steps to fix laptops that can't connect to WAP
ensure NIC is enabled, ensure SSID is chosen
68
Why does switching to 5ghz make the network faster
more channels, less crowded
69
Simple way to improve WLAN performance thru split-the-traffic
make sure different SSIDs are used for 2.4 and 5ghz
70
How to make 802.11n/ac router faster
split traffic between 802.11n 2.4ghz band and 5ghz band