Securing Local Area Network: Endpoint Security Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What feature enables a router to keep a secure local copy of running image and config files in Cisco IOS?

  • Role-Based CLI access
  • Resilient Configuration (correct)
  • AutoSecure
  • Cisco AMP

Which technology can be used to lock down a router mentioned in the text?

  • AutoSecure (correct)
  • Secure Copy Protocol (SCP)
  • Role-Based CLI access
  • Dynamic Arp Inspection

What is used to shut down logins and log messages if a password attack is suspected as per the text?

  • Role-Based CLI access
  • VLAN Truck security
  • Cisco NAC
  • AutoSecure (correct)

Which technology can be implemented to mitigate VLAN hopping attacks as mentioned in the text?

<p>VLAN Truck security (A)</p> Signup and view all the answers

What is used to mitigate ARP attacks according to the text?

<p>Dynamic Arp Inspection (B)</p> Signup and view all the answers

Which technique can be used to mitigate address spoofing based on the text?

<p>IP Source Guard (D)</p> Signup and view all the answers

What is the purpose of VLAN hopping attacks?

<p>To allow an attacker to become a member of all VLANs (B)</p> Signup and view all the answers

How does a VLAN Double-Tagging attack work?

<p>By tagging transmitted frames with multiple 802.1q headers (A)</p> Signup and view all the answers

What is a mitigation strategy for VLAN hopping attacks?

<p>Manually enabling trunk link only on required ports (B)</p> Signup and view all the answers

What could be a method used to mitigate double 802.1Q encapsulation VLAN attacks?

<p>Using the native VLAN 1 for all trunk ports (A)</p> Signup and view all the answers

What action should be taken on unused switch ports to help mitigate VLAN attacks?

<p>Disable all unused switch ports and place them in an unused VLAN (A)</p> Signup and view all the answers

Why is it essential to disable Dynamic Trunk Protocol (DTP) negotiations on ports?

<p>To prevent an attacker from spoofing a switch and becoming a member of all VLANs (D)</p> Signup and view all the answers

What is the purpose of Dynamic ARP Inspection (DAI)?

<p>To prevent ARP poisoning attacks by intercepting and verifying ARP packets (C)</p> Signup and view all the answers

How does DAI mitigate ARP poisoning?

<p>By dropping or logging ARP replies from invalid devices (B)</p> Signup and view all the answers

Which step is a recommended best practice for configuring Dynamic ARP Inspection?

<p>Configuring all uplink ports as untrusted (C)</p> Signup and view all the answers

What is the role of rate limiting in Dynamic ARP Inspection?

<p>To automatically disable interfaces when the limit is exceeded (D)</p> Signup and view all the answers

Why does DAI require DHCP snooping?

<p>To determine the validity of an ARP packet based on MAC-address-to-IP-address bindings (C)</p> Signup and view all the answers

How does DAI differentiate between valid and invalid devices in preventing ARP spoofing?

<p>By verifying IP-to-MAC binding in intercepted packets (C)</p> Signup and view all the answers

What does DAI check when configured to verify destination MAC addresses?

<p>Destination MAC address in Ethernet header against target MAC address in ARP body (B)</p> Signup and view all the answers

Why is IP address spoofing difficult to mitigate, especially inside the same subnet?

<p>Switches overwrite MAC table entries (A)</p> Signup and view all the answers

How does IP Source Guard (IPSG) differ from Dynamic ARP Inspection (DAI)?

<p>IPSG protects against IP and MAC spoofing, while DAI focuses only on IP addresses (D)</p> Signup and view all the answers

What is a consequence of MAC address spoofing attacks on a switch?

<p>The switch assigns the attacker's MAC to the target host's port (C)</p> Signup and view all the answers

Why must an attacker constantly send frames with spoofed addresses in a MAC address spoofing attack?

<p>To ensure frames continue to be incorrectly forwarded (D)</p> Signup and view all the answers

How does DAI differ from IPSG in terms of packet inspection?

<p>DAI inspects only ARP packets, while IPSG examines every packet (A)</p> Signup and view all the answers

What practice immediately brings an interface configured as an access or trunk port to forwarding state from a blocking state?

<p>PortFast (D)</p> Signup and view all the answers

Which practice prevents an inappropriate switch from becoming the root bridge?

<p>Root Guard (A)</p> Signup and view all the answers

What feature immediately error disables a port that receives a BPDU?

<p>BPDU Guard (B)</p> Signup and view all the answers

Which practice prevents alternate or root ports from becoming designated ports due to a unidirectional link failure?

<p>Loop Guard (B)</p> Signup and view all the answers

In what scenario should Root Guard be applied?

<p>All ports which should not become root ports (D)</p> Signup and view all the answers

Where can PortFast be configured globally on all non-trunking ports?

<p>Via the spanning-tree portfast default command (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser