Are You Smarter than a CCNA – Port Security

CCNA

Challenge yourself with these questions about Port Security. These questions are from my text – CCNA Routing and Switching 200-125 Exam Cram (5th Edition)

1. If you issue the single switchport port-security command, name the
resulting port-security mode, violation action, and maximum number of
MAC addresses permitted.
_________

2. What form of port security combines aspects of dynamic learning with
static learning?
_________

3. What command allows you to verify the port-security settings of the Gi0/1
interface?
_________

 

4. What command precedes the switchport port-security command typically?
A. switchport port-security enable
B. switchport mode access
C. switchport mode secure
D. switchport data enable

 

5. What violation mode does Cisco not recommend?
A. Restrict
B. Shutdown
C. Error
D. Protect

 

6. What are two options for recovering from an error disabled port due to port
security? (Choose two.)
A. Port Security Auto Recovery
B. errdisable recovery
C. Manual recovery
D. Port Security Disable

Answers:

1. The mode is dynamic port security, the violation action is Shutdown, and the maximum MAC addresses is 1.

2. Sticky learning.

3. show port-security interface gi0/1

4. B is correct. The switchport mode access command typically must precede switchport port-security as the port cannot be dynamic.

5.  D is correct. Cisco does not recommend the Protect mode as it does not alert the administrator of any violation.

6. B and C are correct. You can have automatic recovery with errdisable recovery, or you can manually recover from the situation.

Are You Smarter Than a CCENT? Transport Layer

Here is a query from a current project – enjoy!

  1. You are examining a packet capture from your local network. What two determinations can you make from this output? (Choose 2)

100-105a. This is a UDP packet
b. This is a TCP packet
c. The target destination is FTP
d. The target destination is HTTP

Correct Answer: b, d

Explanation: Due to its use of reliable transmissions, Transmission Control Protocol (TCP) uses many fields in its packet structure. These include:

  • source TCP port number
  • destination TCP port number
  • sequence number
  • acknowledgement number
  • TCP data offset
  • reserved data
  • control flags
  • window size
  • TCP checksum
  • urgent pointer
  • TCP optional data

In contrast, the unreliable User Datagram Protocol (UDP) packets feature these simple fields:

  • source port number
  • destination port number
  • length
  • checksum

From the destination TCP port number here of 80, you can determine the intended target service is the Hypertext Transfer Protocol (HTTP). Know the following common ports for this exam:

Port Number TCP or UDP Protocol
20 TCP FTP Data
21 TCP FTP Control
22 TCP SSH
23 TCP Telnet
25 TCP SMTP
53 UDP DNS
67, 68 UDP DHCP
69 UDP TFTP
80 TCP HTTP
110 TCP POP3
161 UDP SNMP
443 TCP SSL/TLS
514 UDP Syslog
520 UDP RIP