1. What is a recommended best practice when dealing with the native VLAN?
- Use port security.
- Turn off DTP.
- Assign it to an unused VLAN.
- Assign the same VLAN number as the management VLAN.
2. On what switch ports should PortFast be enabled to enhance STP stability?
- only ports that are elected as designated ports
- all trunk ports that are not root ports
- all end-user ports
- only ports that attach to a neighboring switch
3. Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco?
- switchport port-security mac-address sticky mac-address
- ip dhcp snooping
- shutdown
- switchport port-security violation shutdown
- switchport port-security mac-address sticky
4. Which two features on a Cisco Catalyst switch can be used to mitigate DHCP starvation and DHCP spoofing attacks? (Choose two.)
- DHCP server failover
- extended ACL
- port security
- DHCP snooping
- strong password on DHCP servers
5. What is the best way to prevent a VLAN hopping attack?
- Use ISL encapsulation on all trunk links.
- Disable STP on all nontrunk ports.
- Use VLAN 1 as the native VLAN on trunk ports.
- Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports.
6. Which procedure is recommended to mitigate the chances of ARP spoofing?
- Enable port security globally.
- Enable DHCP snooping on selected VLANs.
- Enable IP Source Guard on trusted ports.
- Enable DAI on the management VLAN.
- Implement protection against DHCP spoofing by enabling DHCP snooping globally.
- Enable DHCP snooping on selected VLANs.
- Enable DAI on selected VLANs.
- Configure trusted interfaces for DHCP snooping and ARP inspection. Untrusted ports are configured by default.
7. What are two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks? (Choose two.)
- unknown port
- trusted DHCP port
- unauthorized port
- established DHCP port
- untrusted port
- authorized DHCP port
- Trusted DHCP ports – switch ports connecting to upstream DHCP servers
- Untrusted ports – switch ports connecting to hosts that should not be providing DHCP server messages
8. Which two commands can be used to enable PortFast on a switch? (Choose two.)
- S1(config-if)# enable spanning-tree portfast
- S1(config-if)# spanning-tree portfast
- S1(config)# enable spanning-tree portfast default
- S1(config)# spanning-tree portfast default
- S1(config-line)# spanning-tree portfast
9. An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?
- Reboot the switch.
- Issue the shutdown command followed by the no shutdown command on the interface.
- Issue the no switchport port-security command, then re-enable port security.
- Issue the no switchport port-security violation shutdown command on the interface.
10. A network administrator is configuring DHCP snooping on a switch. Which configuration command should be used first?
- ip dhcp snooping
- ip dhcp snooping limit rate
- ip dhcp snooping vlan
- ip dhcp snooping trust
- Step 1. Enable DHCP snooping using the ip dhcp snooping global configuration command.
- Step 2. On trusted ports, use the ip dhcp snooping trust interface configuration command.
- Step 3. Enable DHCP snooping by VLAN, or by a range of VLANs.
11. A network administrator is configuring DAI on a switch with the command ip arp inspection validate dst-mac. What is the purpose of this configuration command?
- to check the destination MAC address in the Ethernet header against the MAC address table
- to check the destination MAC address in the Ethernet header against the source MAC address in the ARP body
- to check the destination MAC address in the Ethernet header against the user-configured ARP ACLs
- to check the destination MAC address in the Ethernet header against the target MAC address in the ARP body
- Destination MAC – Checks the destination MAC address in the Ethernet header against the target MAC address in the ARP body.
- Source MAC – Checks the source MAC address in the Ethernet header against the sender MAC address in the ARP body.
- IP address – Checks the ARP body for invalid and unexpected IP addresses including addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.
12. Which security feature should be enabled in order to prevent an attacker from overflowing the MAC address table of a switch?
- storm control
- port security
- BPDU filter
- root guard
13. What Layer 2 attack is mitigated by disabling Dynamic Trunking Protocol?
- VLAN hopping
- DHCP spoofing
- ARP poisoning
- ARP spoofing
14. A network administrator is configuring DAI on a switch. Which command should be used on the uplink interface that connects to a router?
- ip arp inspection trust
- ip dhcp snooping
- ip arp inspection vlan
- spanning-tree portfast
15. Where are dynamically learned MAC addresses stored when sticky learning is enabled with the switchport port-security mac-address sticky command?
- flash
- NVRAM
- RAM
- ROM