What device is considered a supplicant during the 802.1 x authentication process

CCNA 4 v6.0 Chapter 5 Exam Answers 100%

1. What is the behavior of a switch as a result of a successful CAM table attack?

The switch will forward all received frames to all other ports.*

Show

The switch will shut down.

The switch will drop all received frames.

The switch interfaces will transition to the error-disabled state.

2. What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?

DHCP starvation*

DHCP spoofing

IP address spoofing

CAM table attack

3. Refer to the exhibit.

What device is considered a supplicant during the 802.1 x authentication process

Which interface on switch S1 should be configured as a DHCP snooping trusted port to help mitigate DHCP spoofing attacks?

G0/23*

G0/1

G0/24

G0/22

4. When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?

the switch that the client is connected to*

the authentication server

the supplicant

the router that is serving as the default gateway

5. What device is considered a supplicant during the 802.1X authentication process?

the client that is requesting authentication*

the switch that is controlling network access

the authentication server that is performing client authentication

the router that is serving as the default gateway

6. What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers?

There is no ability to provide accountability.

It is very susceptible to brute-force attacks because there is no username.

The passwords can only be stored in plain text in the running configuration.

User accounts must be configured locally on each device, which is an unscalable authentication solution.*

7. Refer to the exhibit.

What device is considered a supplicant during the 802.1 x authentication process

PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration?

1

3

5

7*

8. What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?

RADIUS*

TACACS+

SSH

MD5

9. Which two protocols are used to provide server-based AAA authentication? (Choose two.)

SSH

TACACS+*

RADIUS*

802.1x

SNMP

10. Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?

802.1x*

RADIUS

TACACS+

SSH

11. What are three techniques for mitigating VLAN attacks? (Choose three.)

Disable DTP.*

Enable trunking manually.*

Set the native VLAN to an unused VLAN.*

Enable BPDU guard.

Enable Source Guard.

Use private VLANs.

12. Which statement describes SNMP operation?

An NMS periodically polls the SNMP agents that are residing on managed devices by using traps to query the devices for data.​

A get request is used by the SNMP agent to query the device for data.​

An SNMP agent that resides on a managed device collects information about the device and stores that information remotely in the MIB that is located on the NMS.​

A set request is used by the NMS to change configuration variables in the agent device.*

13. A network administrator is analyzing the features supported by the multiple versions of SNMP. What are two features that are supported by SNMPv3 but not by SNMPv1 or SNMPv2c? (Choose two.)

bulk retrieval of MIB information

message source validation*

community-based security

message encryption*

SNMP trap mechanism

14. Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router?

SNMP*

syslog

NTP

NetFlow

15. What is the function of the MIB element as part of a network management system?

to store data about a device*

to collect data from SNMP agents

to change configurations on SNMP agents

to send and retrieve network management information

16. Which SNMP version uses weak community string-based access control and supports bulk retrieval?

SNMPv2c*

SNMPv1

SNMPv2Classic​

SNMPv3​

17. What are SNMP trap messages?

messages that are used by the NMS to query the device for data

unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network*

messages that are used by the NMS to change configuration variables in the agent device

messages that are sent periodically by the NMS to the SNMP agents that reside on managed devices to query the device for data

18. A network administrator issues two commands on a router:

R1(config)# snmp-server host 10.10.50.25 version 2c campus
R1(config)# snmp-server enable traps

What can be concluded after the commands are entered?

No traps are sent, because the notification-types argument was not specified yet.

Traps are sent with the source IP address as 10.10.50.25.

If an interface comes up, a trap is sent to the server.*

The snmp-server enable traps command needs to be used repeatedly if a particular subset of trap types is desired.

19. Refer to the exhibit.

What device is considered a supplicant during the 802.1 x authentication process

What can be concluded from the produced output?

An ACL was configured to restrict SNMP access to an SNMP manager.*

This is the output of the show snmp command without any parameters.

The system contact was not configured with the snmp-server contact command.

The location of the device was not configured with the snmp-server location command.

20. Refer to the exhibit.

What device is considered a supplicant during the 802.1 x authentication process

A SNMP manager has IP address 172.16.1.120. The SNMP manager is unable to change configuration variables on the R1 SNMP agent. What could be the problem?

The ACL of ACL_SNMP has not been implemented on an interface yet.

The IP address of the SNMP manager must be 172.16.1.1.

The SNMP agent should have traps disabled.

The SNMP agent is not configured for write access.*

21. Refer to the exhibit.

What device is considered a supplicant during the 802.1 x authentication process

Router R1 was configured by a network administrator to use SNMP version 2. The following commands were issued:

R1(config)# snmp-server community batonaug ro SNMP_ACL
R1(config)# snmp-server contact Wayne World
R1(config)# snmp-server host 192.168.1.3 version 2c batonaug
R1(config)# ip access-list standard SNMP_ACL
R1(config-std-nacl)# permit 192.168.10.3

Why is the administrator not able to get any information from R1?

The snmp-server enable traps command is missing.​

The snmp-server community command needs to include the rw keyword.​

There is a problem with the ACL configuration.*

The snmp-server location command is missing.​

22. A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.)

It adds a new user to the SNMP group.*

It restricts SNMP access to defined SNMP managers.

It forces the network manager to log into the agent to retrieve the SNMP messages.

It uses the MD5 authentication of the SNMP messages.*

It allows a network administrator to configure a secret encrypted password on the SNMP server.

23. Which statement describes the RSPAN VLAN?

The RSPAN VLAN must be the same as the native VLAN.

The RSPAN VLAN can be used to carry secure traffic between switches.

The RSPAN VLAN can be used for remote management of network switches.

The RSPAN VLAN must be the same on both the source and destination switch.*

24. Which statement describes the function of the SPAN tool used in a Cisco switch?

It supports the SNMP trap operation on a switch.

It provides interconnection between VLANs over multiple switches.

It is a secure channel for a switch to send logging to a syslog server.

It copies the traffic from one switch port and sends it to another switch port that is connected to a monitoring device.*

25. Refer to the exhibit.

What device is considered a supplicant during the 802.1 x authentication process

Based on the output generated by the show monitor session 1 command, how will SPAN operate on the switch?

All traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to FastEthernet 0/1.

All traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1.*

Native VLAN traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1.

Native VLAN traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to FastEthernet 0/1.

26. Refer to the exhibit.

What device is considered a supplicant during the 802.1 x authentication process

Which command or set of commands will configure SW_A to copy all traffic for the server to the packet analyzer?

Sw_A(config)# monitor session 5 source interface gi0/1
Sw_A(config)# monitor session 6 destination interface fa0/7

Sw_A(config)# monitor session 5 source interface gi0/1
Sw_A(config)# monitor session 5 destination interface fa0/7*

Sw_A(config)# monitor session 1 destination interface fa0/7

Sw_A(config)# monitor session 1 destination interface gi0/1
Sw_A(config)# monitor session 1 source interface fa0/1

Sw_A(config)# monitor session 1 source interface fa0/7

What device is considered a supplicant during the 802.1X authentication process the?

The supplicant, or client, is the device attempting to gain access to the network. You can configure the Aruba user-centric network to support 802.1X authentication for wired users and wireless users. The authenticator is the gatekeeper to the network and permits or denies access to the supplicants.

What are the three main components of IEEE 802.1 X?

There are three main components in the 802.1X authentication cycle:.
Supplicant Port Access Entity (PAE). This is software on the client device which handles the client side of the authentication conversation..
Authenticator PAE. ... .
Network Authentication Server (NAS)..

What is the 802.1X protocol?

802.1X protocol—An IEEE standard for port-based network access control (PNAC) on wired and wireless access points. 802.1X defines authentication controls for any user or device trying to access a LAN or WLAN. NAC—A proven networking concept that identifies users and devices by controlling access to the network.

What is 802.1X and how does it work?

802.1X is a network authentication protocol that opens ports for network access when an organization authenticates a user's identity and authorizes them for access to the network. The user's identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server.