Home
66.
You are configuring a Cisco multilayer switch for the Company network. Which command would you use to configure a port to act as a routed interface?
  • A.
    ip routing
  • B.
    switchport mode trunk
  • C.
    no switchport
  • D.
    switchport trunk native vlan 1
  • E.
    None of the other alternatives apply
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Report
Name Email  
67.
The Company security administrator is concerned with VLAN hopping based attacks. Which two statements about these attacks are true? (Select two)
  • A.
    Attacks are prevented by utilizing the port-security feature.
  • B.
    An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
  • C.
    Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
  • D.
    An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
  • E.
    Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
  • Answer & Explanation
  • Report
Answer : [B, E]
Explanation :
Report
Name Email  
68.
The Company security administrator wants to prevent VLAN hopping on the network. What is one method that can be used to do this?
  • A.
    Configure VACLs.
  • B.
    Configure all frames with two 802.1Q headers.
  • C.
    Enforce username/password combinations.
  • D.
    Configure VACLs.
  • E.
    Explicitly turn off Dynamic Trunking Protocol (DTP) on all unused ports.
  • Answer & Explanation
  • Report
Answer : [E]
Explanation :
When securing VLAN trunks, also consider the potential for an exploit called VLAN hopping. Here, an attacker positioned on one access VLAN can craft and send frames with spoofed 802.1Q tags so that the packet payloads ultimately appear on a totally different VLAN, all without the use of a router.
Report
Name Email  
69.
A hacker on the Company network is attempting to hop onto a different VLAN. Which two statements about VLAN hopping are true? (Choose two)
  • A.
    An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
  • B.
    Configuring an interface with the "switchport mode dynamic" command will prevent VLAN hopping.
  • C.
    Attacks are prevented by utilizing the port-security feature.
  • D.
    Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
  • E.
    An end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.
  • Answer & Explanation
  • Report
Answer : [A, D]
Explanation :
Report
Name Email  
70.
LDAP is being used throughout the Company wireless network. Which statement about the Lightweight Access Point Protocol (LWAPP) protocol is true?
  • A.
    The processing of 802.11 data and management protocols and access point capabilities is distributed between a lightweight access point and a centralized WLAN controller.
  • B.
    LWAPP advertises its WDS capability and participates in electing the best WDS device for the wireless LAN.
  • C.
    LWAPP aggregates radio management forward information and sends it to a wireless LAN solution engine.
  • D.
    LWAPP authenticates all access points in the subnet and establishes a secure communication channel with each of them.
  • E.
    None of the other alternatives apply
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Report
Name Email