Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Gaaabriel
G
Gaaabriel
Community Contributor
Quizzes Created: 8 | Total Attempts: 4,503
| Attempts: 117 | Questions: 26
Please wait...
Question 1 / 26
0 %
0/100
Score 0/100
1. What is the behavior of a switch as a result of a successful CAM table attack?

Explanation

A successful CAM table attack can cause the switch to forward all received frames to all other ports. This means that the switch will no longer use its CAM table to determine the appropriate port to forward frames to, resulting in all frames being broadcasted to all ports. This can lead to network congestion and potential security risks as sensitive information can be accessed by unauthorized devices connected to the network.

Submit
Please wait...
About This Quiz
CCNA 4, Chapter 5 Exam - Quiz

This exam assesses knowledge on network security within the CCNA curriculum, focusing on CAM table attacks, DHCP spoofing, and 802.1X authentication.

Personalize your quiz and earn a certificate with your name on it!
2. What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?

Explanation

RADIUS (Remote Authentication Dial-In User Service) is the correct answer. RADIUS is a protocol used to encapsulate the EAP (Extensible Authentication Protocol) data between the authenticator and authentication server during 802.1X authentication. It allows for centralized authentication, authorization, and accounting for network access. TACACS+ is another protocol used for similar purposes but is not specifically used for encapsulating EAP data in 802.1X authentication. SSH MD5 and MD5 are unrelated protocols and hashing algorithms respectively, and are not used for encapsulating EAP data.

Submit
3. Refer to the exhibit. Which interface on switch S1 should be configured as a DHCP snooping trusted port to help mitigate DHCP spoofing attacks?

Explanation

The correct answer is G0/23. DHCP snooping is a security feature that helps mitigate DHCP spoofing attacks by allowing the switch to inspect DHCP messages and verify the legitimacy of DHCP servers. Configuring G0/23 as a DHCP snooping trusted port means that the switch will trust DHCP messages received on this interface and not perform any security checks on them. This is important because G0/23 is connected to the DHCP server, and we want to ensure that legitimate DHCP messages from the server are not blocked or dropped.

Submit
4. What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?

Explanation

The drawback of the local database method of securing device access is that user accounts must be configured locally on each device, which is an unscalable authentication solution. This means that as the number of devices and users increases, it becomes increasingly difficult and time-consuming to manage and maintain user accounts on each individual device. By using AAA with centralized servers, user accounts can be managed and authenticated centrally, allowing for a more scalable and efficient authentication solution.

Submit
5. Which two protocols are used to provide server-based AAA authentication? (Choose two.)

Explanation

TACACS+ and RADIUS are both protocols used to provide server-based AAA (Authentication, Authorization, and Accounting) authentication. TACACS+ (Terminal Access Controller Access Control System Plus) is a Cisco proprietary protocol that provides centralized authentication, authorization, and accounting services. RADIUS (Remote Authentication Dial-In User Service) is a widely used protocol that provides similar authentication and authorization services. Both protocols allow for centralized authentication and authorization, allowing organizations to manage user access and permissions from a central server.

Submit
6. What is the function of the MIB element as part of a network management system?

Explanation

The MIB element in a network management system is responsible for storing data about a device. It serves as a database that holds information related to the device's configuration, performance, and status. This data can be accessed by the network management system to monitor and manage the device effectively. By storing relevant data, the MIB element enables administrators to analyze and troubleshoot network issues, track device performance, and make informed decisions regarding network management.

Submit
7. Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

Explanation

In order for PC1 and PC2 to obtain IP address assignments from the DHCP server, all ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration. This ensures that the DHCP messages between the clients and the server are not blocked or filtered, allowing for successful IP address assignments.

Submit
8. What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?

Explanation

DHCP starvation is a network attack that aims to create a Denial of Service (DoS) for clients by preventing them from obtaining a DHCP lease. This attack floods the DHCP server with a large number of DHCP requests, depleting the available IP addresses in the DHCP pool. As a result, legitimate clients are unable to obtain an IP address and are effectively denied network access. This attack can disrupt network operations and cause inconvenience for users who rely on DHCP for IP address assignment.

Submit
9. When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?

Explanation

When using 802.1X authentication, the switch that the client is connected to controls physical access to the network based on the authentication status of the client. The switch acts as the intermediary between the client and the network, enforcing the authentication process. It determines whether to allow or deny network access based on the authentication status received from the client.

Submit
10. Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?

Explanation

802.1x is the correct answer because it is a protocol that provides port-based authentication, allowing network administrators to control access to the LAN by restricting unauthorized hosts from connecting through publicly accessible switch ports. It provides a way to authenticate and authorize devices before granting them access to the network, ensuring that only authenticated and authorized devices can connect. RADIUS, TACACS+, and SSH are not specifically designed for port-based authentication.

Submit
11. What are three techniques for mitigating VLAN attacks? (Choose three.)

Explanation

Three techniques for mitigating VLAN attacks are disabling DTP, enabling trunking manually, and setting the native VLAN to an unused VLAN. Disabling DTP prevents unauthorized devices from negotiating trunk links, reducing the risk of VLAN hopping attacks. Enabling trunking manually ensures that only authorized devices are allowed to establish trunk links. Setting the native VLAN to an unused VLAN prevents attackers from accessing the native VLAN and potentially gaining unauthorized access to other VLANs. These techniques help enhance the security and integrity of VLAN deployments.

Submit
12. A network administrator is analyzing the features supported by the multiple versions of SNMP. What are two features that are supported by SNMPv3 but not by SNMPv1 or SNMPv2c? (Choose two.)

Explanation

SNMPv3 supports message source validation, which ensures that the messages are coming from a trusted source. This feature helps prevent unauthorized access and ensures the integrity of the messages. SNMPv1 and SNMPv2c do not have this feature, making them more susceptible to spoofing attacks.

SNMPv3 also supports message encryption, which provides confidentiality for the messages exchanged between the SNMP manager and agents. This feature ensures that the information remains secure and cannot be intercepted by unauthorized parties. SNMPv1 and SNMPv2c do not have message encryption, making them vulnerable to eavesdropping attacks.

Submit
13. Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?

Explanation

SNMP (Simple Network Management Protocol) is a protocol that allows devices on a network to be managed and monitored. It enables network administrators to collect information from network devices, such as routers, and send unsolicited messages or alerts about network events. In this case, SNMP can be configured to send an alert to the network administrator when there is an extremely high CPU utilization on a router.

Submit
14. Which SNMP version uses weak community string-based access control and supports bulk retrieval?

Explanation

SNMPv2c is the correct answer because it is the version of SNMP that uses weak community string-based access control. This means that access to SNMP devices is controlled by a community string, which is essentially a password, but it is not very secure. SNMPv2c also supports bulk retrieval, which allows for the retrieval of multiple pieces of data in a single request, making it more efficient for managing large networks.

Submit
15. What are SNMP trap messages?

Explanation

SNMP trap messages are unsolicited messages sent by the SNMP agent to alert the Network Management System (NMS) about a specific condition on the network. These messages are not initiated by the NMS, but rather sent by the agent when it detects a predefined event or condition. The purpose of SNMP trap messages is to notify the NMS about network issues or events that require attention or further investigation.

Submit
16. Which statement describes the function of the SPAN tool used in a Cisco switch?

Explanation

The SPAN tool in a Cisco switch is used to copy the traffic from one switch port and send it to another switch port that is connected to a monitoring device. This allows for the monitoring and analysis of network traffic without interrupting the normal flow of data.

Submit
17. A network administrator issues two commands on a router: R1(config)# snmp-server host 10.10.50.25 version 2c campus R1(config)# snmp-server enable traps What can be concluded after the commands are entered?

Explanation

The given commands configure the router to send SNMP traps to the server when an interface comes up. The "snmp-server host" command specifies the IP address of the server (10.10.50.25) and the SNMP version (2c). The "snmp-server enable traps" command enables the router to send traps. Therefore, the conclusion is that if any interface on the router comes up, a trap will be sent to the specified server.

Submit
18. Refer to the exhibit. What can be concluded from the produced output?

Explanation

From the given output of the show snmp command without any parameters, it can be concluded that an ACL (Access Control List) was configured to restrict SNMP access to an SNMP manager. This can be inferred from the fact that the system contact was not configured with the snmp-server contact command, and the location of the device was not configured with the snmp-server location command. These two commands are typically used to configure SNMP settings, but since they were not configured, it suggests that the SNMP access is restricted by an ACL instead.

Submit
19. Which statement describes the RSPAN VLAN?

Explanation

The RSPAN VLAN must be the same on both the source and destination switch because RSPAN (Remote Switched Port Analyzer) is a feature that allows monitoring of traffic from multiple switches across a network. In order for the traffic to be correctly mirrored from the source switch to the destination switch, they must both be configured with the same RSPAN VLAN. This ensures that the mirrored traffic is correctly tagged and transported between the switches.

Submit
20. Refer to the exhibit. A SNMP manager has IP address 172.16.1.120. The SNMP manager is unable to change configuration variables on the R1 SNMP agent. What could be the problem?

Explanation

The SNMP manager is unable to change configuration variables on the R1 SNMP agent because the SNMP agent is not configured for write access. This means that the agent is only configured to allow read access, preventing any changes to be made to the configuration variables.

Submit
21. Refer to the exhibit. Which command or set of commands will configure SW_A to copy all traffic for the server to the packet analyzer?

Explanation

The correct answer is Sw_A(config)# monitor session 5 source interface gi0/1Sw_A(config)# monitor session 5 destination interface fa0/7. This is the correct set of commands to configure SW_A to copy all traffic for the server to the packet analyzer. The "monitor session" command is used to configure a SPAN (Switched Port Analyzer) session, which allows for the monitoring of network traffic. In this case, session 5 is being configured to copy the traffic from interface gi0/1 (the source) to interface fa0/7 (the destination), effectively sending all traffic for the server to the packet analyzer.

Submit
22. Refer to the exhibit. Router R1 was configured by a network administrator to use SNMP version 2. The following commands were issued: R1(config)# snmp-server community batonaug ro SNMP_ACL R1(config)# snmp-server contact Wayne World R1(config)# snmp-server host 192.168.1.3 version 2c batonaug R1(config)# ip access-list standard SNMP_ACL R1(config-std-nacl)# permit 192.168.10.3 Why is the administrator not able to get any information from R1?

Explanation

The administrator is not able to get any information from R1 because there is a problem with the ACL configuration. The command "ip access-list standard SNMP_ACL" is used to create an access control list, but it only permits the IP address 192.168.10.3. This means that only SNMP requests from this specific IP address will be allowed, and all other requests will be denied. Since the administrator is not making the request from this IP address, they are being denied access to the SNMP information on R1.

Submit
23. Refer to the exhibit. Based on the output generated by the show monitor session 1 command, how will SPAN operate on the switch?

Explanation

The correct answer is "All traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1." This means that any traffic that is either received on VLAN 10 or transmitted from VLAN 20 will be sent to FastEthernet 0/1. This configuration allows for monitoring of the traffic on these VLANs by sending a copy of the traffic to the specified interface.

Submit
24. A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)

Explanation

The command "snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99" has two features. Firstly, it adds a new user named "admin1" to the SNMP group. Secondly, it uses the MD5 authentication method to authenticate SNMP messages.

Submit
25. Which statement describes SNMP operation?

Explanation

The correct answer states that a set request is used by the NMS to change configuration variables in the agent device. This means that the Network Management System (NMS) has the ability to modify the configuration settings of the SNMP agent device. The NMS can send a set request to the agent, instructing it to change certain variables or settings. This allows the NMS to remotely manage and control the agent device's configuration.

Submit
26. What device is considered a supplicant during the 802.1X authentication process?

Explanation

During the 802.1X authentication process, the device that is considered a supplicant is the client that is requesting authentication. The supplicant is the device that initiates the authentication process by sending its credentials to the authentication server. In this case, the client device is requesting authentication from the server in order to gain access to the network. The switch, authentication server, and router mentioned in the other options are not considered the supplicant in this context.

Submit
View My Results

Quiz Review Timeline (Updated): Jul 12, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 12, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 05, 2017
    Quiz Created by
    Gaaabriel
Cancel
  • All
    All (26)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the behavior of a switch as a result of a successful CAM table...
What protocol is used to encapsulate the EAP data between the...
Refer to the exhibit. Which interface on switch S1 should be...
What is a drawback of the local database method of securing device...
Which two protocols are used to provide server-based AAA...
What is the function of the MIB element as part of a network...
Refer to the exhibit. PC1 and PC2 should be able to obtain IP address...
What network attack seeks to create a DoS for clients by preventing...
When using 802.1X authentication, what device controls physical access...
Which protocol defines port-based authentication to restrict...
What are three techniques for mitigating VLAN attacks? (Choose three.)
A network administrator is analyzing the features supported by the...
Which protocol or service can be configured to send unsolicited...
Which SNMP version uses weak community string-based access control and...
What are SNMP trap messages?
Which statement describes the function of the SPAN tool used in a...
A network administrator issues two commands on a router: R1(config)#...
Refer to the exhibit. What can be concluded from the produced output?
Which statement describes the RSPAN VLAN?
Refer to the exhibit. A SNMP manager has IP address 172.16.1.120. The...
Refer to the exhibit. Which command or set of commands will configure...
Refer to the exhibit. Router R1 was configured by a network...
Refer to the exhibit. Based on the output generated by the show...
A network administrator has issued the snmp-server user admin1 admin...
Which statement describes SNMP operation?
What device is considered a supplicant during the 802.1X...
Alert!

Advertisement