1. |
The correct answers are b, c, and d. Answer a is incorrect because the thresholds for multicast and unicast traffic are independent of one another. Answer e is incorrect because the action shutdown command will shut down the port if any of the configured thresholds have been reached. |
2. |
False. The attack described is a MAC address spoofing attack. A CAM table overflow attack sends many frames into a switch port with various source MAC addresses in an attempt to overflow the CAM table and make the switch act like a hub for subsequent frames; this floods frames out all ports, including the one that the attacker is connected to. |
3. |
Answers c and d are correct. A and b are incorrect because, though the descriptions are accurate, BPDU guard and root guard are enabled with different commands. |
4. |
True. The switchport port-security command can only be used on an access port. Access ports are used for endpoint connectivity. |
5. |
Answers a and c are correct. Answers b and d are non-existent commands. |
6. |
False. SPAN can copy (replicate) traffic from specific ports as well as VLANs to a dedicated monitoring port. It is very useful when certain flows through the switch need to be monitored for signs of intrusion and other purposes. |