單項(xiàng)選擇題

The Company security administrator wants to prevent DHCP spoofing. 
Which statement is true  about DHCP spoofing operation?()

A. DHCP spoofing and SPAN cannot be used on the same port of a switch.
B. To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.
C. To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.
D. DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.
E. None of the other alternatives apply.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

The Company security administrator is concerned with layer 2 network attacks. 
Which two  statements about these attacks are true? ()

A. ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
B. ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.
C. MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
D. ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.
E. MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

2.單項(xiàng)選擇題

You work as a network technician at Company. Your boss, Mrs.   , is interested in  
switch spoofing. 
She asks you how an attacker would collect information with VLAN hoping  through switch spoofing. You should tell her that the attacking station... ()

A、...uses VTP to collect VLAN information that is sent out and then tags itself with the domain  information in order to capture the data.
B、...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a  VLAN that would be inaccessible to the attacker through legitimate means.
C、...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the  trunk.
D、...tags itself with all usable VLANs to capture data that is passed through the switch, regardless  of the VLAN to which the data belongs.
E、None of the other alternatives apply

3.單項(xiàng)選擇題

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,
 which is true regarding layer 2 security and mitigation techniques? ()


A. Enable root guard to mitigate ARP address spoofing attacks.
B. Configure DHCP spoofing to mitigate ARP address spoofing attacks.
C. Configure PVLANs to mitigate MAC address flooding attacks.
D. Enable root guard to mitigate DHCP spoofing attacks.
E. Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
F. Configure port security to mitigate MAC address flooding  
G. None of the other alternatives apply


4.單項(xiàng)選擇題

Refer to the exhibit. An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to  establish a DHCP server for a man-in-middle attack.
 Which recommendation, if followed, would  mitigate this type of attack?()


A. All switch ports in the Building Access block should be configured as DHCP untrusted ports.  
B. All switch ports in the Building Access block should be configured as DHCP trusted ports.
C. All switch ports connecting to servers in the Server Farm block should be configured as DHCP  untrusted ports.
D. All switch ports connecting to hosts in the Building Access block should be configured as DHCP  trusted ports.
E. All switch ports in the Server Farm block should be configured as DHCP untrusted ports.
F. All switch ports connecting to hosts in the Building Access block should be configured as DHCP  untrusted ports.


5.多項(xiàng)選擇題

Refer to the exhibit. On the basis of the output generated by the show commands, 
which two  statements are true?()

A. Because it is configured as a trunk interface, interface gigabitethernet 0/1 does not appear in  the show vlan output.
B. VLAN 1 will not be encapsulated with an 802.1q header.
C. There are no native VLANs configured on the trunk.
D. VLAN 2 will not be encapsulated with an 802.1q header.
E. All interfaces on the switch have been configured as access ports.
F. Because it has not been assigned to any VLAN, interface gigabitethernet 0/1 does not appear in  the show vlan output.

最新試題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:單項(xiàng)選擇題

What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()

題型:單項(xiàng)選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:單項(xiàng)選擇題

Which three statements are true of the Link Aggregation Control Protocol (LACP)?()

題型:多項(xiàng)選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:單項(xiàng)選擇題

Which three statements about STP timers are true?()

題型:多項(xiàng)選擇題

Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:單項(xiàng)選擇題

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

題型:單項(xiàng)選擇題