CCNA Practice Questions – Infastructure

Which method can restrict a user from plugging a wireless access point into a corporate network?

Correct! Wrong!

What does port security use to block unauthorized access?

Correct! Wrong!

Which command will enable port security? Switch(config)#switchport port-security Switch(config)#port-security enable Switch(config-if)#switchport port-security Switch(config-if)#port-security enable

Correct! Wrong!

If port security is enabled on an interface, what is the maximum number of MAC addresses allowed by default?

Correct! Wrong!

Which layer of the OSI model does port security use for securing a port?

Correct! Wrong!

Why would a network admin choose to configure port security on an interface?

Correct! Wrong!

Which statement is correct about port security?

Correct! Wrong!

When configuring port security on a port that contains a VoIP phone with a voice VLAN and a computer connected to the phone, how many MAC addresses must you allow?

Correct! Wrong!

What is the default action of port security on the interface when the maximum number of MAC addresses is exceeded?

Correct! Wrong!

You are configuring a port for port security and receive the error “Command rejected: FastEthernet0/1 is a dynamic port.” Which commands will help you configure the port?

Correct! Wrong!

Which command will allow you to configure two MAC addresses for port security?

Correct! Wrong!

Which command will limit devices via port security without disabling the port and logging the restricted device?

Correct! Wrong!

Which command will allow you to inspect the status of a port that has been configured for port security?

Correct! Wrong!

Which command will limit devices via port security and send an SNMP trap notification?

Correct! Wrong!

Which command will limit devices via port security without disabling the port and not provide logging for a security violation counter?

Correct! Wrong!

Which command will allow you to see logged security violations for port security?

Correct! Wrong!

You have been tasked to secure ports with port security. You need to make sure that only the computers installed can access the network. The computers are installed already. Which type of configuration for port security would require the least amount of administration?

Correct! Wrong!