exam questions

Exam 350-601 All Questions

View all questions & answers for the 350-601 exam

Exam 350-601 topic 1 question 381 discussion

Actual exam question from Cisco's 350-601
Question #: 381
Topic #: 1
[All 350-601 Questions]

An engineer deploys a new Cisco Nexus 5000 Series Switch in an existing environment with strict security policies. The new device should meet these requirements:

• Secure end-user ports with minimum configuration effort.
• Log security breaches and require manual recovery.
• Retain the switch configuration if the device restarts.

Which configuration must be used?

  • A. switchport port-security
    switchport port-security max 1
    switchport port-security mac-address sticky
  • B. switchport port-security
    switchport port-security violation restrict
    switchport port-security mac-address sticky
  • C. switchport port-security
    switchport port-security violation shutdown
    switchport port-security mac-address dynamic
  • D. switchport port-security
    switchport port-security max 1
    switchport port-security violation shutdown
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JGBARRIO
Highly Voted 2 years, 5 months ago
It´s A
upvoted 8 times
...
Rollizo
Most Recent 12 months ago
Selected Answer: A
It is A because shutdown violation mode is the default and sticky keep the MAC address after the reboot
upvoted 2 times
...
0ed2da0
1 year, 1 month ago
Selected Answer: C
Here is the configuration that meets these requirements: C. switchport port-security switchport port-security violation shutdown switchport port-security mac-address dynamic
upvoted 1 times
...
crooks_1988
1 year, 5 months ago
It is A!!! Default option is "shutdown" if no option is configured (from cisco 5000 guide) Security violation action Shutdown
upvoted 1 times
...
oasc
1 year, 9 months ago
Selected Answer: D
D. violation shutdown is the only one that requires manual recovery.
upvoted 1 times
...
Huberttheman
2 years, 1 month ago
Selected Answer: B
B....violation shutdown does not syslog, violation restrict does
upvoted 3 times
...
Scheldon
2 years, 3 months ago
Selected Answer: A
it's A
upvoted 4 times
...
Gayan84
2 years, 4 months ago
The answer is <<<< B >>>> Sticky Method If you enable the sticky method, the device secures MAC addresses in the same manner as dynamic address learning, but the device stores addresses learned by this method in nonvolatile RAM (NVRAM). As a result, addresses learned by the sticky method persist through a device restart. Sticky secure MAC addresses do not appear in the running configuration of an interface. You explicitly remove the address You configure the interface to act as a Layer 3 interface Dynamic Method By default, when you enable port security on an interface, you enable the dynamic learning method. With this method, the device secures MAC addresses as ingress traffic passes through the interface. A dynamic secure MAC address entry remains in the configuration of an interface until one of the following events occurs: The device restarts The interface restarts The address reaches the age limit that you configured for the interface You explicitly remove the address You configure the interface to act as a Layer 3 interface
upvoted 1 times
Gayan84
2 years, 4 months ago
Sorry guys! answer << A >> seems correct due to the default violation is shutdown ( No need to configure if it does not want to change explicitly)
upvoted 2 times
...
...
paradigm88
2 years, 4 months ago
Selected Answer: A
is A by elimination
upvoted 4 times
...
paradigm88
2 years, 4 months ago
Shutdown - In this (default) violation mode Also 1 mac is the default number of macs allowed before a violation occurs
upvoted 2 times
...
marriot33
2 years, 4 months ago
Selected Answer: B
• Retain the switch configuration if the device restarts. Sticky Method If you enable the sticky method, the device secures MAC addresses in the same manner as dynamic address learning, but the device stores addresses learned by this method in nonvolatile RAM (NVRAM). As a result, addresses learned by the sticky method persist through a device restart. Sticky secure MAC addresses do not appear in the running configuration of an interface
upvoted 3 times
...
Ronny2202
2 years, 5 months ago
A. If port security is enabled, the default settings on a Nexus 5000 switch are: The maximum number of MAC addresses allowed per port is 1. The violation action is set to "shutdown", which means that the port will be disabled if a violation occurs. The violation mode is set to "restrict", which means that traffic from the violating MAC address is dropped and a syslog message is generated, but the port remains enabled. Sticky secure MAC addresses – like Dynamic secure MAC addresses, MACs are learned dynamically but are saved in the running configuration.
upvoted 4 times
...
Rocky_Truth
2 years, 5 months ago
Selected Answer: C
C. To meet the requirements of securing end-user ports with minimum configuration effort, logging security breaches, and retaining the switch configuration in case of a device restart, the following configuration should be used: this configuration will enable port security with sticky MAC addresses, which will allow the switch to dynamically learn the MAC addresses of connected devices and save them to the running configuration. If a security breach occurs, the switch will automatically shut down the port and log the event. The spanning-tree portfast and bpduguard commands are added to minimize the risk of a rogue device connecting to the port and disrupting the network.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...