Computer Networking Fundamentals Week 3 Flashcards

(10 cards)

1
Q

What are the three violation modes in Cisco switches and their corresponding actions?

A

Protect mode drops packets from unauthorized MAC addresses, restrict mode sends an SNMP trap to the network administrator, and shutdown mode disables the port after multiple violation attempts.

In Cisco switches, protect mode drops packets from unauthorized MAC addresses, restrict mode sends an SNMP trap to the network administrator, and shutdown mode disables the port after multiple violation attempts. These violation modes provide different actions to handle unauthorized access attempts on switch ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is Cisco IOS commonly used for configuring and managing network devices?

A

By executing commands in the command-line interface (CLI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a scenario involving a port security violation, which violation mode and recovery action would be appropriate?

A

Shutdown mode and manual recovery.

In a scenario involving a port security violation, the appropriate violation mode would be “shutdown” mode, which disables the port when a violation occurs. The recovery action would be “manual recovery,” requiring the network administrator to manually re-enable the port after addressing the violation. Shutdown mode ensures that unauthorized devices are prevented from accessing the network and manual recovery allows for investigation and resolution of the violation before restoring normal network operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Cisco IOS command is used to assign a unique hostname to a Cisco switch?

A

hostname

The “hostname” command is used to set the device name for identification purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of port security in Cisco switches?

A

To prevent unauthorized devices from connecting to switch ports and ensure that only authorized devices can access the network.

The purpose of port security in Cisco switches is to prevent unauthorized devices from connecting to switch ports and to ensure that only authorized devices can access the network. Port security helps enforce network security policies by limiting access to switch ports and by reducing the risk of unauthorized access or network breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cisco IOS analyzes the device’s logging and debugging output for any indications of errors or abnormal behavior.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of the initial device configuration process on Cisco IOS devices?

A

To establish network connectivity and basic settings for the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can network traffic be analyzed using Wireshark?

A

By capturing and examining network packets in real-time.

Wireshark is a network protocol analyzer that allows users to capture and examine network packets in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which IOS command is necessary for remote access implementation on Cisco switches?

A

line vty

The “line vty” command is necessary for remote access implementation on Cisco switches. It is used to configure virtual terminal (VTY) lines, which provide remote access to the device’s CLI through Telnet or SSH protocols. By configuring VTY lines, administrators can enable remote access and define authentication methods, such as username and password, so that remote users can connect to the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the associated codes is used for directly connected devices in a routing table?

A

C

The associated code “C” is used in a routing table to indicate directly connected networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly