CCNA – Security Questions Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rap
R
Rap
Community Contributor
Quizzes Created: 12 | Total Attempts: 38,525
Questions: 8 | Attempts: 651

SettingsSettingsSettings
CCNA  Security Questions Quiz - Quiz

These days, there is nothing more important in the entire field of networking than security, and as such you need to be immensely aware of all the security protocols needed to be undertaken when working in the field. Do you know all about how to keep data secure? Let’s find out.


Questions and Answers
  • 1. 

    Which Cisco Catalyst feature automatically disables the port in an operational PortFast upon receipt of a BPDU?

    • A.

      BackboneFast

    • B.

      UplinkFast

    • C.

      Root Guard

    • D.

      BPDU Guard

    • E.

      BPDU Filter

    Correct Answer
    D. BPDU Guard
    Explanation
    We only enable PortFast feature on access ports (ports connected to end stations). But if someone does not know he can accidentally plug that port to another switch and a loop may occur when BPDUs are being transmitted and received on these ports.

    With BPDU Guard, when a PortFast receives a BPDU, it will be shut down to prevent a loop -> D is correct.

    Rate this question:

  • 2. 

    Which two commands correctly verily whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two)

    • A.

      SW1# show switchport port-security interface FastEthernet 0/12

    • B.

      SW1# show switchport port-secure interface FastEthernet 0/12

    • C.

      SW1# show port-security interface FastEthernet 0/12

    • D.

      SW1# show running-config

    Correct Answer(s)
    C. SW1# show port-security interface FastEthernet 0/12
    D. SW1# show running-config
    Explanation
    We can verify whether port security has been configured by using the “show running-config” or “show port-security interface ” for more detail. An example of the output of “show port-security interface ” command is shown below:

    Rate this question:

  • 3. 

    Select the action that results from executing these commands:Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address sticky

    • A.

      A dynamically learned MAC address is saved in the startup-configuration file.

    • B.

      A dynamically learned MAC address is saved in the running-configuration file.

    • C.

      A dynamically learned MAC address is saved in the VLAN database.

    • D.

      Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.

    • E.

      Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

    Correct Answer
    B. A dynamically learned MAC address is saved in the running-configuration file.
    Explanation
    The full syntax of the second command is:

    switchport port-security mac-address sticky [MAC]

    If we don’t specify the MAC address (like in this question) then the switch will dynamically learn the attached MAC Address and place it into your running-configuration -> B is correct.

    Rate this question:

  • 4. 

    Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch.2950Switch(config-if)#switchport port-security2950Switch(config-if)#switchport port-security mac-address sticky2950Switch(config-if)#switchport port-security maximum 1The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch? (Choose two)

    • A.

      The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF.

    • B.

      Only host A will be allowed to transmit frames on fa0/1.

    • C.

      This frame will be discarded when it is received by 2950Switch.

    • D.

      All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.

    • E.

      Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1.

    • F.

      Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be forwarded out fa0/1.

    Correct Answer(s)
    B. Only host A will be allowed to transmit frames on fa0/1.
    D. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1.
    Explanation
    Please read the explanation at http://www.9tut.net/icnd2/icnd2-operations

    Rate this question:

  • 5. 

    Which set of commands is recommended to prevent the use of a hub in the access layer?

    • A.

      Switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1

    • B.

      Switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1

    • C.

      Switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1

    • D.

      Switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

    Correct Answer
    C. Switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
    Explanation
    Port security is only used on access port (which connects to hosts) so we need to set that port to “access” mode, then we need to specify the maximum number of hosts which are allowed to connect to this port -> C is correct.

    Note: If we want to allow a fixed MAC address to connect, use the “switchport port-security mac-address ” command.

    Rate this question:

  • 6. 

    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two)

    • A.

      Port security needs to be globally enabled.

    • B.

      Port security needs to be enabled on the interface.

    • C.

      Port security needs to be configured to shut down the interface in the event of a violation.

    • D.

      Port security needs to be configured to allow only one learned MAC address.

    • E.

      Port security interface counters need to be cleared before using the show command.

    • F.

      The port security configuration needs to be saved to NVRAM before it can become active.

    Correct Answer(s)
    B. Port security needs to be enabled on the interface.
    D. Port security needs to be configured to allow only one learned MAC address.
    Explanation
    As we see in the output, the “Port Security” is in “Disabled” state (line 2 in the output). To enable Port security feature, we must enable it on that interface first with the command:

    SwitchA(config-if)#switchport port-security

    -> B is correct.

    Also from the output, we learn that the switch is allowing 2 devices to connect to it (switchport port-security maximum 2) but the question requires allowing only PC_A to access the network so we need to reduce the maximum number to 1 -> D is correct.

    Rate this question:

  • 7. 

    A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two)

    • A.

      The network administrator can apply port security to dynamic access ports

    • B.

      The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.

    • C.

      The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

    • D.

      The network administrator can apply port security to EtherChannels.

    • E.

      When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined.

    Correct Answer(s)
    C. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
    E. When dynamic mac address learning is enabled on an interface, the switch can learn new addresses up to the maximum defined.
    Explanation
    Follow these guidelines when configuring port security:
    + Port security can only be configured on static access ports, trunk ports, or 802.1Q tunnel ports. -> A is not correct.
    + A secure port cannot be a dynamic access port.
    + A secure port cannot be a destination port for Switched Port Analyzer (SPAN).
    + A secure port cannot belong to a Fast EtherChannel or Gigabit EtherChannel port group. -> D is not correct
    + You cannot configure static secure or sticky secure MAC addresses on a voice VLAN. -> B is not correct.
    + When you enable port security on an interface that is also configured with a voice VLAN, you must set the maximum allowed secure addresses on the port to at least two.
    + If any type of port security is enabled on the access VLAN, dynamic port security is automatically enabled on the voice VLAN.
    + When a voice VLAN is configured on a secure port that is also configured as a sticky secure port, all addresses seen on the voice VLAN are learned as dynamic secure addresses, and all addresses seen on the access VLAN (to which the port belongs) are learned as sticky secure addresses.
    + The switch does not support port security aging of sticky secure MAC addresses.
    + The protect and restrict options cannot be simultaneously enabled on an interface.

    (Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_19_ea1/configuration/guide/3550scg/swtrafc.html#wp1038546)

    Note: Dynamic access port or Dynamic port VLAN membership must be connected to an end station. This type of port can be configured with the “switchport access vlan dynamic” command in the interface configuration mode. Please read more about Dynamic access port here: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_19_ea1/configuration/guide/3550scg/swvlan.html#wp1103064

    Rate this question:

  • 8. 

    Which protocol is an open standard protocol framework that is commonly used in VPNs to provide secure end-to-end connections?

    • A.

      PPTP

    • B.

      IPsec

    • C.

      RSA

    • D.

      L2TP

    Correct Answer
    B. IPsec
    Explanation
    One of the most widely deployed network security technologies today is IPsec over VPNs. It provides high levels of security through encryption and authentication, protecting data from unauthorized access.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 24, 2015
    Quiz Created by
    Rap
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.