Which Layer 2 Attack Will Result in Legitimate Users Not Getting Valid IP Addresses?
Which Layer 2 Attack Will Result in Legitimate Users Not Getting Valid IP Addresses?
ARP spoofing
DHCP starvation
IP address spoofing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
What is the result of a DHCP starvation attack?
The attacker provides incorrect DNS and default gateway information to clients.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Which two Cisco solutions help prevent DHCP starvation attacks? (Choose two.)
DHCP Snooping
IP Source Guard
Port Security
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the
DHCP server. How many ports among switches should be assigned as trusted ports as part
of the DHCP snooping configuration?
1
3
5
7
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
*
17. A network administrator needs to configure a standard ACL so that only the workstation
of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the
main router. Which two configuration commands can achieve the task? (Choose two.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Which statement describes a characteristic of standard IPv4 ACLs?
They can be configured to filter traffic based on both source IP addresses and source ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
20. Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic
from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24
should be permitted. This standard ACL was then applied outbound on interface Fa0/0.
Which conclusion can be drawn from this configuration?
The ACL should be applied to the FastEthernet 0/0 interface of R1 inbound to accomplish the
requirements.
All traffic will be blocked, not just traffic from the 172.16.4.0/24 subnet.
Only traffic from the 172.16.4.0/24 subnet is blocked, and all other traffic is allowed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
*
16. Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on
the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most
likely cause of the traffic failure?
The port number for the traffic has not been identified with the eq keyword.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
*
19. A network administrator is writing a standard ACL that will deny any traffic from the
172.16.0.0/16 network, but permit all other traffic. Which two commands should be used?
(Choose two.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
51. A technician is tasked with using ACLs to secure a router. When would the technician
use the ‘ip access-group 101 in’ configuration option or command?
56. What does the CLI prompt change to after entering the command ip access-list standard
aaa from global configuration mode?
Router(config-line)#
Router(config-std-nacl)#
Router(config)#
Router(config-router)#
Router(config-if)# © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
*
21. Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-
CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet
this requirement?
0.0.00001111.255
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
*
23. Refer to the exhibit. What can be determined from this output?
The ACL is only monitoring traffic destined for 10.23.77.101 from three specific hosts.
Because there are no matches for line 10, the ACL is not working.
The router has not had any Telnet packets from 10.35.80.22 that are destined for 10.23.77.101.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
42. Which two keywords can be used in an access control list to replace a wildcard mask or
address and wildcard mask pair? (Choose two.)
host
most
gt
some
any
all
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
62. A technician is tasked with using ACLs to secure a router. When would the technician
use the no access-list 101 configuration option or command?
to identify one specific IP address © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
43. Which statement describes a difference between the operation of inbound and outbound
ACLs?
Inbound ACLs are processed before the packets are routed while outbound ACLs are processed
after the routing is completed.
In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria.
On a network interface, more than one inbound ACL can be configured but only one outbound ACL
can be configured.
Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on
routers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15