CCNAS Chapter 6 - CCNA Security Implementing Network Security (Version 1.1)

更新时间:2023-08-01 18:44:25 阅读: 评论:0

鲜花简笔画寓言成语故事
1
窗体顶端
As a recommended practice for Layer 2 curity, how should VLAN 1 be treated?
Correct
Respon
Your
Respon
All access ports should be assigned to VLAN 1.
All trunk ports should be assigned to VLAN 1.
VLAN 1 should be ud for management traffic.
VLAN 1 should not be ud.
窗体底端
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.3.8 Recommended Practices for Layer 2
3
窗体顶端
Which option best describes a MAC address spoofing attack?
Correct
Respon
Your
Respon
An attacker gains access to another host and masquerades as the rightful ur of that device.
An attacker alters the MAC address of his host to match another known MAC address of a target host.
An attacker alters the MAC address of the switch to gain access to the network device from a rogue host device.
An attacker floods the MAC address table of a switch so that the switch can no longer filter network access bad on MAC address.
窗体底端
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.2.2 MAC Address Spoofing Attacks
7
窗体顶端
Refer to the exhibit. What action will the switch take when the maximum number of cure MAC address has reached the allowed limit on the Fa0/2 port?
Correct
Respon粪桶
Your
Respon
Packets with unknown source address are dropped, but notification of the dropped packets is nt.
The VLAN that Fa0/2 is on is t to error-disabled and all traffic on the VLAN is stopped.
The interface immediately becomes error-disabled and the port LED is turned off.
Packets with unknown source address are dropped without notification.
窗体底端
榨菜炒鸡蛋
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.3.1 Configuring Port Security
8
窗体顶端
Which software tool can a hacker u to flood the MAC address table of a switch?
Correct
Respon
Your
Respon
继代培养macof
Cisco CCP
kiwi syslog rver
protocol analyzer
窗体底端
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.2.3 MAC Address Table Overflow Attacks
9
窗体顶端
Which two methods are ud to mitigate VLAN attacks? (Choo two.)
Correct
Respon
Your
Respon
enabling port curity on all trunk ports
using a dummy VLAN for the native VLAN
implementing BPDU guard on all access ports
disabling DTP autonegotiation on all trunk ports
using ISL instead of 802.1q encapsulation on all trunk interfaces
窗体底端
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.2.6 VLAN Attacks
10
窗体顶端
Which three switch curity commands are required to enable port curity on a port so that it will dynamically learn a single MAC address and disable the port if a host with any other MAC address is connected? (Choo three.)
中国结英文Correct
Respon
Your
Respon
switchport mode access
switchport mode trunk
switchport port-curity
switchport port-curity maximum 2
switchport port-curity mac-address sticky
switchport port-curity mac-address mac-address
窗体底端
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.3.1 Configuring Port Security
11
窗体顶端
What is an example of a trusted path in an operating system?
Correct
Respon
Your
Respon
digital certificate
digital signature
hash message authentication
Ctrl-Alt-Delete key quence
窗体底端
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.1.1 Introducing Endpoint Security馒头花样
12
窗体顶端
Why are traditional network curity perimeters not suitable for the latest consumer-bad network endpoint devices?
Correct
Respon
Your
Respon
The devices are not managed by the corporate IT department.
The devices are more varied in type and are portable.
The devices connect to the corporate network through public wireless networks.
The devices po no risk to curity as they are not directly connected to the corporate network.
窗体底端
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.1.1 Introducing Endpoint Security
13
窗体顶端
Which Cisco IronPort appliance would an organization install to manage and monitor curity policy ttings and audit information?
Correct
Respon
Your
Respon
C-Series
M-Series
S-Series
SenderBa-Series
窗体底端
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.1.2 Endpoint Security with IronPort
14
窗体顶端
Which Cisco IronPort appliance would an organization install to protect against malware?
Correct
Respon
Your
Respon
C-Series
M-Series
S-Series
SenderBa-Series
窗体底端
This item references content from the following areas:
CCNA Security: Implementing Network Security
6.1.2 Endpoint Security with IronPort
15
窗体顶端
What is the goal of the Cisco NAC framework and the Cisco NAC appliance?
Correct
Respon
Your
Respon
to ensure that only hosts that are authenticated and have had their curity posture examined and approved are permitted onto the network
to monitor data from the company to the ISP in order to build a real-time databa of current spam threats from both internal and external sources
新年英语
to provide anti-malware scanning at the network perimeter for both authenticated and non-authenticated devices
to provide protection against a wide variety of web-bad threats, including adware, phishing attacks, Trojan hors, and worms
窗体底端

本文发布于:2023-08-01 18:44:25,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/89/1104665.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:鲜花   继代   炒鸡蛋   馒头   简笔画   培养   榨菜
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图