Computer Networking Fundamentals Week 3 Flashcards
(10 cards)
What are the three violation modes in Cisco switches and their corresponding actions?
Protect mode drops packets from unauthorized MAC addresses, restrict mode sends an SNMP trap to the network administrator, and shutdown mode disables the port after multiple violation attempts.
In Cisco switches, protect mode drops packets from unauthorized MAC addresses, restrict mode sends an SNMP trap to the network administrator, and shutdown mode disables the port after multiple violation attempts. These violation modes provide different actions to handle unauthorized access attempts on switch ports.
How is Cisco IOS commonly used for configuring and managing network devices?
By executing commands in the command-line interface (CLI).
In a scenario involving a port security violation, which violation mode and recovery action would be appropriate?
Shutdown mode and manual recovery.
In a scenario involving a port security violation, the appropriate violation mode would be “shutdown” mode, which disables the port when a violation occurs. The recovery action would be “manual recovery,” requiring the network administrator to manually re-enable the port after addressing the violation. Shutdown mode ensures that unauthorized devices are prevented from accessing the network and manual recovery allows for investigation and resolution of the violation before restoring normal network operation.
Which Cisco IOS command is used to assign a unique hostname to a Cisco switch?
hostname
The “hostname” command is used to set the device name for identification purposes.
What is the purpose of port security in Cisco switches?
To prevent unauthorized devices from connecting to switch ports and ensure that only authorized devices can access the network.
The purpose of port security in Cisco switches is to prevent unauthorized devices from connecting to switch ports and to ensure that only authorized devices can access the network. Port security helps enforce network security policies by limiting access to switch ports and by reducing the risk of unauthorized access or network breaches.
Cisco IOS analyzes the device’s logging and debugging output for any indications of errors or abnormal behavior.
True
What is the primary purpose of the initial device configuration process on Cisco IOS devices?
To establish network connectivity and basic settings for the device.
How can network traffic be analyzed using Wireshark?
By capturing and examining network packets in real-time.
Wireshark is a network protocol analyzer that allows users to capture and examine network packets in real-time.
Which IOS command is necessary for remote access implementation on Cisco switches?
line vty
The “line vty” command is necessary for remote access implementation on Cisco switches. It is used to configure virtual terminal (VTY) lines, which provide remote access to the device’s CLI through Telnet or SSH protocols. By configuring VTY lines, administrators can enable remote access and define authentication methods, such as username and password, so that remote users can connect to the switch.
Which of the associated codes is used for directly connected devices in a routing table?
C
The associated code “C” is used in a routing table to indicate directly connected networks.