Chapter 9: Security

  1. C. To stop unauthorized users from accessing the LAN, you can configure port security on your switch.
  2. B, D. switchport port-security is an important command, and you can set the maximum number of MAC addresses allowed into the port and then set the penalty if this maximum has been passed.
  3. B. Your first step in creating a comprehensive network security plan is to physically secure all your network equipment.
  4. B, D. Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) help prevent threats by watching for trends, particular patterns, and other factors.
  5. B, C. You should always have a firewall on your network to block access from outside devices. In addition, Cisco recommends always using Secure Shell (SSH) ...

Get CCENT Cisco Certified Entry Networking Technician Study Guide: (ICND1 Exam 640-822), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.