Filters
Question type

Study Flashcards

You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?


A) Use the switchport port-security command to enable MAC filtering.
B) Use the mac-limit command to prevent more than one MAC from being accepted.
C) Use the allowed-mac command to filter by MAC address.
D) Use the secure port mac-address command to limit the port to learned addresses only.

Correct Answer

verifed

verified

In Open System Authentication, how does authentication occur?


A) The client sends a pre-shared key along with the access point's SSID.
B) The client requests an encrypted tunnel, after which, the client's MAC serves as the authentication.
C) The access point forces the client to authenticate via a captive portal, after which all communication is encrypted.
D) The client "authenticates" using only the SSID name. In other words, no real authentication occurs.

Correct Answer

verifed

verified

What scenario might be ideal for the use of root guard in configuring a switch?


A) You wish to block BPDUs on an access port serving network hosts.
B) You wish to disable STP on a port connected to a partnered company's switch.
C) You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.
D) You wish to prevent a rogue switch or computer from hijacking the network's STP paths.

Correct Answer

verifed

verified

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Correct Answer

verifed

verified

Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port?


A) port supertrunking
B) port mirroring
C) port shadowing
D) port lurking

Correct Answer

verifed

verified

When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?


A) file integrity monitoring (FIM)
B) file change management (FCM)
C) file access auditing (FAA)
D) file checksum watching (FCW)

Correct Answer

verifed

verified

By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer?


A) Google Authenticator
B) RADIUS
C) TACACS+
D) Kerberos

Correct Answer

verifed

verified

When using Kerberos, what is the purpose of a ticket?


A) It is the name for a Kerberos client or user.
B) It is a key used by the client to gain access to services that are protected by the key on the network.
C) It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
D) It is the event that is generated when auditing a resource and unauthorized access is attempted.

Correct Answer

verifed

verified

What statement correctly describes a stateless firewall?


A) A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.
B) A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
C) A stateless firewall blocks designated types of traffic based on application data contained within packets.
D) A stateless firewall filters packets based on source and destination IP addresses.

Correct Answer

verifed

verified

In a network access control (NAC) system, what are the two different types of software agents that are commonly used?

Correct Answer

verifed

verified

Two types of agents that are commonly us...

View Answer

Showing 41 - 50 of 50

Related Exams

Show Answer