Modules 1013
Modules 1013
2. What are two protocols that are used by AAA to authenticate users
against a central database of usernames and password? (Choose two.)
o NTP
o TACACS+
o SSH
o HTTPS
o RADIUS
o CHAP
DCHP starvation attacks are launched by an attacker with the intent to create a
DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that
sends many DHCPDISCOVER messages to lease the entire pool of available
IP addresses, thus denying them to legitimate hosts.
4. What represents a best practice concerning discovery protocols such as
CDP and LLDP on network devices?
o Use the open standard LLDP rather than CDP.
o Disable both protocols on all interfaces where they are not required.
o Use the default router settings for CDP and LLDP.
o Enable CDP on edge devices, and enable LLDP on interior devices.
When the MAC address table is full, the switch treats the frame as an
unknown unicast and begins to flood all incoming traffic to all ports only
within the local VLAN.
A VLAN hopping attack enables traffic from one VLAN to be seen by another
VLAN without routing. In a basic VLAN hopping attack, the attacker takes
advantage of the automatic trunking port feature enabled by default on most
switch ports.
The security violation counter for Fa0/2 has been incremented (evidenced by
the 1 in the SecurityViolation column). The most secure addresses allowed on
port Fa0/2 is 1 and that address was manually entered. Therefore, PC1 must
have a different MAC address than the one configured for port Fa0/2.
Connections between end devices and the switch, as well as connections
between a router and a switch, are made with a straight-through cable.
The default mode for a port security violation is to shut down the port so the
switchport port-security violation command is not necessary. The switchport
port-security command must be entered with no additional options to enable
port security for the port. Then, additional port security options can be added.
14.Refer to the exhibit. Port security has been configured on the Fa 0/12
interface of switch S1. What action will occur when PC1 is attached to
switch S1 with the applied configuration?
CCNA 2
SRWE v7 Modules 10 – 13 – L2 Security and WLANs Exam Answers 04
o Frames from PC1 will be dropped, and a log message will be created.
o Frames from PC1 will be dropped, and there will be no log of the violation.
o Frames from PC1 will cause the interface to shut down immediately, and a log
entry will be made.
o Frames from PC1 will be forwarded to its destination, and a log entry will be
created.
o Frames from PC1 will be forwarded to its destination, but a log entry will not
be created.
o Frames from PC1 will be forwarded since the switchport port-security
violation command is missing.
Manual configuration of the single allowed MAC address has been entered for
port fa0/12. PC1 has a different MAC address and when attached will cause
the port to shut down (the default action), a log message to be automatically
created, and the violation counter to increment. The default action of shutdown
is recommended because the restrict option might fail if an attack is underway.
18.Refer to the exhibit. PC1 and PC2 should be able to obtain IP address
assignments from the DHCP server. How many ports among switches
should be assigned as trusted ports as part of the DHCP snooping
configuration?
CC
NA 2 SRWE v7 Modules 10 – 13 – L2 Security and WLANs Exam Answers 05
o 1
o 3
o 5
o 7
DAI can be configured to check for both destination or source MAC and IP
addresses:
Destination MAC – Checks the destination MAC address in the Ethernet
header against the target MAC address in the ARP body.
Source MAC – Checks the source MAC address in the Ethernet header against
the sender MAC address in the ARP body.
IP address – Checks the ARP body for invalid and unexpected IP addresses
including addresses 0.0.0.0, 255.255.255.255, and all IP multicast addresses.
23.As part of the new security policy, all switches on the network are
configured to automatically learn MAC addresses for each port. All
running configurations are saved at the start and close of every business
day. A severe thunderstorm causes an extended power outage several
hours after the close of business. When the switches are brought back
online, the dynamically learned MAC addresses are retained. Which
port security configuration enabled this?
o auto secure MAC addresses
o dynamic secure MAC addresses
o static secure MAC addresses
o sticky secure MAC addresses
With sticky secure MAC addressing, the MAC addresses can be either
dynamically learned or manually configured and then stored in the address
table and added to the running configuration file. In contrast, dynamic secure
MAC addressing provides for dynamically learned MAC addressing that is
stored only in the address table.
Beacons are the only management frame that may regularly be broadcast by an
AP. Probing, authentication, and association frames are used only during the
association (or reassociation) process.
Omnidirectional antennas send the radio signals in a 360 degree pattern around
the antenna. This provides coverage to devices situated anywhere around the
access point. Dishes, directional, and Yagi antennas focus the radio signals in
a single direction, making them less suitable for covering large, open areas.
SSID cloaking is a weak security feature that is performed by APs and some
wireless routers by allowing the SSID beacon frame to be disabled. Although
clients have to manually identify the SSID to be connected to the network, the
SSID can be easily discovered. The best way to secure a wireless network is to
use authentication and encryption systems. SSID cloaking does not provide
free Internet access in public locations, but an open system authentication
could be used in that situation.
27.What are the two methods that are used by a wireless NIC to discover
an AP? (Choose two.)
o sending an ARP request
o delivering a broadcast frame
o transmitting a probe request
o initiating a three-way handshake
o receiving a broadcast beacon frame
Two methods can be used by a wireless device to discover and register with an
access point: passive mode and active mode. In passive mode, the AP sends a
broadcast beacon frame that contains the SSID and other wireless settings. In
active mode, the wireless device must be manually configured for the SSID,
and then the device broadcasts a probe request.
Ad hoc mode (also known as independent basic service set or IBSS) is used in
a peer-to-peer wireless network such as when Bluetooth is used. A variation of
the ad hoc topology exists when a smart phone or tablet with cellular data
access is enabled to create a personal wireless hotspot. Mixed mode allows
older wireless NICs to attach to an access point that can use a newer wireless
standard.
WPA and WPA2 come in two types: personal and enterprise. Personal is used
in home and small office networks. Shared key allows three different
authentication techniques: (1) WEP, (2) WPA, and (3) 802.11i/WPA2. WEP is
an encryption method.
30.What two IEEE 802.11 wireless standards operate only in the 5 GHz
range? (Choose two.)
o 802.11a
o 802.11b
o 802.11g
o 802.11n
o 802.11ac
o 802.11ad
The 802.11a and 802.11ac standards operate only in the 5 GHZ range. The
802.11b and 802.11g standards operate only in the 2.4 GHz range. The
802.11n standard operates in both the 2.4 and 5 GHz ranges. The 802.11ad
standard operates in the 2.4, 5, and 60 GHz ranges.
Channels 1, 6, and 11 are selected because they are 5 channels apart. thus
minimizing the interference with adjacent channels. A channel frequency can
interfere with channels on either side of the main frequency. All wireless
devices need to be used on nonadjacent channels.
Active is a mode used to configure an access point so that clients must know
the SSID to connect to the access point. APs and wireless routers can operate
in a mixed mode meaning that that multiple wireless standards are supported.
Open is an authentication mode for an access point that has no impact on the
listing of available wireless networks for a client. When an access point is
configured in passive mode, the SSID is broadcast so that the name of wireless
network will appear in the listing of available networks for clients.
Because some users are complaining about the network being too slow, the
correct option would be to split the traffic so that there are two networks using
different frequencies at the same time. Replacing the wireless NICs will not
necessarily correct the network being slow and it could be expensive for the
company. DHCP versus static addressing should have no impact of the
network being slow and it would be a huge task to have all users assigned
static addressing for their wireless connection. Upgrading the firmware on the
wireless access point is always a good idea. However, if some of the users are
experiencing a slow network connection, it is likely that this would not
substantially improve network performance.
The Cisco 3504 WLC dashboard displays when a user logs into the WLC. It
provides some basic settings and menus that users can quickly access to
implement a variety of common configurations. By clicking the Advanced
button, the user will access the advanced Summary page and access all the
features of the WLC.
37.On a Cisco 3504 WLC Summary page ( Advanced > Summary ), which
tab allows a network administrator to access and configure a WLAN for
a specific security option such as WPA2?
o WLANs
o SECURITY
o WIRELESS
o MANAGEMENT
The WLANs tab in the Cisco 3504 WLC advanced Summary page allows a
user to access the configuration of WLANs including security, QoS, and
policy-mapping.
Any address with the 10 in the first octet is a private IPv4 address and cannot
be routed on the internet. The wireless router will use a service called Network
Address Translation (NAT) to convert private IPv4 addresses to internet-
routable IPv4 addresses for wireless devices to gain access to the internet.
Many wireless routers have an option for configuring quality of service (QoS).
By configuring QoS, certain time-sensitive traffic types, such as voice and
video, are prioritized over traffic that is not as time-sensitive, such as email
and web browsing.
Each new WLAN configured on a Cisco 3500 series WLC needs its own
VLAN interface. Thus it is required that a new VLAN interface to be created
first before a new WLAN can be created.
Wireless range is determined by the access point antenna and output power,
not the frequency band that is used. In this scenario it is stated that all users
have wireless NICs that comply with the latest standard, and so all can access
the 5 GHz band. Although some users may find it inconvenient to switch to
the 5 Ghz band to access streaming services, it is the greater number of
channels, not just fewer users, that will improve network performance.
By default, dual-band routers and APs use the same network name on both the
2.4 GHz band and the 5 GHz band. The simplest way to segment traffic is to
rename one of the wireless networks.
A wireless laptop normally does not have an antenna attached unless a repair
has recently been implemented. If the wireless NIC is enabled, the correct
media, radio, will be used. When the NIC detects an access point, the correct
frequency is automatically used.
The access control component that controls what users can do on a network is
Authorization. Here’s a brief overview of each term you mentioned and their
roles in network security:
In summary, for controlling what users can do on the network, the key concept
is Authorization. Authentication and 802.1X are more about verifying
identity before granting network access, while accounting deals with
monitoring and recording user activities.
The access control component that audits what user actions are performed on
the network is Accounting. Here’s a brief overview of each component and
their primary functions:
The access control component that logs EXEC and configuration commands
configured by a user is Accounting. This component of network security and
management is specifically focused on tracking and recording user activities,
including the logging of EXEC commands (commands a user executes in a
network session) and configuration changes made by a user. Here’s a brief
overview of each term for clarity:
The access control component that collects and reports usage data is
Accounting. Here’s a brief overview of its role compared to the other
components:
The access control component that indicates the success or failure of a client-
requested service with a PASS or FAIL message is Authentication. Here’s the
rationale for each component:
1. Authentication: This process involves verifying the identity of a user
or device attempting to access a network or service. If the credentials
provided by the user (like a username and password) are valid, the
authentication process typically indicates success with a message akin
to “PASS.” Conversely, if the credentials are invalid or the
authentication process otherwise fails, it indicates failure, often with a
“FAIL” message. This PASS or FAIL feedback is a direct part of the
authentication process.
2. Authorization: Once a user is authenticated, authorization determines
what they are allowed to do on the network, such as accessing specific
resources or executing certain operations. While it grants or denies
access to resources based on policies, it doesn’t typically use PASS or
FAIL messages in the same way as authentication.
3. Accounting: This component involves tracking and recording network
resource usage, focusing on monitoring user activities rather than
granting or denying access. It doesn’t provide PASS or FAIL messages
related to user requests.
4. 802.1X: This is a network access control protocol used for securing
networks, particularly through authentication mechanisms. While
802.1X is integral to managing network access, the specific indication
of success or failure with PASS or FAIL messages is a function of the
underlying authentication process.
The access control component that is based on the device roles of supplicant,
authenticator, and authentication server is 802.1X. Here’s an explanation of its
roles:
The access control component that is based upon usernames and passwords is
Authentication. Here’s a brief explanation:
The type of wireless network that uses transmitters to provide coverage over
an extensive geographic area is a Wireless Wide-Area Network (WWAN).
Here’s a brief overview of each type mentioned for clarity:
The type of wireless network that commonly uses Bluetooth or ZigBee devices
is a Wireless Personal-Area Network (WPAN). Here’s a brief overview of
each type for clarity:
In summary, for the use of Bluetooth or ZigBee devices, the appropriate type
of network is a Wireless Personal-Area Network (WPAN).
The type of wireless network that uses transmitters to provide wireless service
over a large urban region is a Wireless Metropolitan-Area Network
(WMAN). Here’s a brief explanation of each network type:
In summary, for covering a large urban region, the appropriate type of network
is a Wireless Metropolitan-Area Network (WMAN).
The type of wireless network that is suitable for use in a home or office is a
Wireless Local-Area Network (WLAN). Here’s why:
The type of wireless network that often makes use of devices mounted on
buildings is a Wireless Metropolitan-Area Network (WMAN). Here’s the
rationale:
The type of wireless network that is based on the 802.11 standard and operates
on a 2.4-GHz or 5-GHz radio frequency is a Wireless Local-Area Network
(WLAN). Here’s why:
The type of wireless network that is suitable for providing wireless access to a
city or district is a Wireless Metropolitan-Area Network (WMAN). Here’s a
brief explanation:
The type of wireless network that uses low powered transmitters for a short-
range network, usually spanning 20 to 30 feet (6 to 9 meters), is a Wireless
Personal-Area Network (WPAN). Here’s a brief overview:
67.Match each functional component of AAA with its description. (Not all
options are used.)
CCNA 2 SRWE v7 Modules 10 – 13 – L2 Security and WLANs Exam Answers 001
Authentication: This is the process that proves that users are who they
say they are. It typically involves verifying a user’s identity through
methods such as passwords, biometrics, tokens, etc.
Authorization: This component determines what resources users can
access or the operations they are allowed to perform. Once a user is
authenticated, authorization dictates what they are allowed to do on the
network.
Accounting: This process records what users do and what they access.
It often involves collecting data on user activities, such as start and
stop times of sessions, executed commands, used network resources,
and other activities for the purpose of billing, auditing, and reporting.
70.Refer to the exhibit. What can be determined about port security from
the information that is shown?
CCNA 2
SRWE v7 Modules 10 – 13 – L2 Security and WLANs Exam Answers 03
The Port Security line simply shows a state of Enabled if the switchport port-
security command (with no options) has been entered for a particular switch
port. If a port security violation had occurred, a different error message
appears such as Secure-shutdown . The maximum number of MAC addresses
supported is 50. The Maximum MAC Addresses line is used to show how
many MAC addresses can be learned (2 in this case). The Sticky MAC
Addresses line shows that only one device has been attached and learned
automatically by the switch. This configuration could be used when a port is
shared by two cubicle-sharing personnel who bring in separate laptops.
Splitting the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz
band will allow for the 802.11n to use the two bands as two separate wireless
networks to help manage the traffic, thus improving wireless performance.
75.Open the PT Activity. Perform the tasks in the activity instructions and
then answer the question.
CCNA 2 SRWE v7 Modules 10 – 13 – L2 Security and WLANs Exam Answers PT
001
Which event will take place if there is a port security violation on switch
S1 interface Fa0/1?
o A notification is sent.
o A syslog message is logged.
o Packets with unknown source addresses will be dropped.
o The interface will go into error-disabled state.
The violation mode can be viewed by issuing the show port-security interface
<int> command. Interface FastEthernet 0/1 is configured with the violation
mode of protect. If there is a violation, interface FastEthernet 0/1 will drop
packets with unknown MAC addresses.
Recommend
RC211V
2 years ago
Hi! Answer to question 44 is wrong, it should be “It is used to encrypt the messages between
the WLC and the RADIUS server.” Tested a couple of days ago 😉
0
Reply
InfraExam
Author
Reply to RC211V
2 years ago
Appreciate. Thank you for you help. We have just update. Good luck for your study journey.
1
Reply
washo_r
2 years ago
0
Reply
InfraExam
Author
Reply to washo_r
2 years ago
Thank you Washo_r. We have just updated. Good Luck with you.
0
Reply
Recommended Sponsor!
Recent Comments
CCNA1 v7
CCNA2 v7
CCNA3 v7
Categories
CyberOps Associate– CA – Lab Answers
CyberOps Associate– CA – Packet Tracer Answers
DevNet – DEVASC – Lab Answers
DevNet – DEVASC – Packet Tracer Lab Answers
ITEv7 – Lab Answers
ITEv7 – Packet Tracer Lab Answers
NE 2.0 – Lab Answers
NE 2.0 Packet Tracer Activity Lab Answers
NS 1.0 – Lab Answers
NS 1.0 – Packet Tracer Activity Lab Answers
SEO
Uncategorized
Updated