"Do I Know This Already?" Quiz The purpose of the "Do I Know This Already?" quiz is to help you decide what parts of this chapter to use. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now. The quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time. Table 18-1 outlines the major topics discussed in this chapter and the "Do I Know This Already?" quiz questions that correspond to those topics. Table 18-1. "Do I Know This Already?" Foundation Topics Section-to-Question MappingFoundation Topics Section | Questions Covered in This Section | Score |
---|
VLAN ACLs | 14 | | Private VLANs | 58 | | Securing VLAN Trunks | 910 | | Monitoring Switch Ports | 1114 | | Total Score | | |
Caution The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or are only partially sure of the answer, you should mark this question wrong. Giving yourself credit for an answer you correctly guess skews your self-assessment results and might give you a false sense of security. 1. | Which one of the following can filter packets even if they are not routed to another Layer 3 interface? IP extended access lists MAC address access lists VLAN access lists Port-based access lists | 2. | In what part of a Catalyst switch are VLAN ACLs implemented? NVRAM CAM RAM TCAM | 3. | Which one of the following commands can implement a VLAN ACL called test? access-list vlan test vacl test switchport vacl test vlan access-map test | 4. | After a VACL is configured, where is it applied? Globally on a VLAN On the VLAN interface In the VLAN configuration On all ports or interfaces mapped to a VLAN | 5. | Which of the following private VLANs is the most restrictive? Community VLAN Isolated VLAN Restricted VLAN Promiscuous VLAN | 6. | The vlan 100 command has just been entered. What is the next command needed to configure VLAN 100 as a secondary isolated VLAN? private-vlan isolated private-vlan isolated 100 pvlan secondary isolated No further configuration is necessary. | 7. | What type of port configuration should you use for private VLAN interfaces that connect to a router? Host Gateway Promiscuous Transparent | 8. | Promiscuous ports must be ______________ to primary and secondary VLANs, and host ports must be ________________. mapped, associated mapped, mapped associated, mapped associated, associated | 9. | In a switch spoofing attack, an attacker makes use of which one of the following? The switch-management IP address CDP message exchanges Spanning Tree Protocol DTP to negotiate a trunk | 10. | Which one of the following represents the spoofed information an attacker sends in a VLAN hopping attack? 802.1Q tags DTP information VTP information 802.1x information | 11. | Which of the following allows a port to be mirrored to another port on the same switch? VSPAN RSPAN SPAN CSPAN | 12. | What must be used to connect switches used for RSPAN? An 802.1Q trunk Access-mode switch ports (single VLAN) A private VLAN over a trunk An RSPAN VLAN over a trunk | 13. | What is the most important difference between an RSPAN VLAN and a regular VLAN? The RSPAN VLAN disables MAC address learning. The RSPAN VLAN uses static MAC address definitions. The RSPAN VLAN has the RSPAN source and destination MAC addresses defined in the CAM table. The RSPAN VLAN cannot be carried over a trunk link. | 14. | To configure an RSPAN session's source switch, what is used for the session destination? The switch port leading to the destination switch The RSPAN VLAN The final destination switch port The next-hop router | The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to Chapter 'Do I Know This Already?' Quizzes and Q&A Sections." The suggested choices for your next step are as follows: 11 or less overall score Read the entire chapter. This includes the "Foundation Topics," "Foundation Summary," and "Q&A" sections. 12 or more overall score If you want more review on these topics, skip to the "Foundation Summary" section and then go to the "Q&A" section at the end of the chapter. Otherwise, move to Chapter 19, "Scenarios for Final Preparation." |