單項選擇題

You work as a network engineer for. You study the exhibit carefully. 
What type of attack would be mitigated by this configuration?()

A.CDP manipulation
B.VLAN hopping
C.MAC spoofing
D.MAC flood attack
E.ARP spoofing
F.spanning tree compromises


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題

You want to enhance the security within the LAN and prevent VLAN hopping.
 What two steps can be taken to help prevent this?()

A.Enable BPD guard
B.Disable CDP on ports where it is not necessary
C.Place unused ports in a common unrouted VLAN
D.Prevent automatic trunk configuration
E.Implement port security

2.單項選擇題

The network administrator has enabled BPDU guard on the LAN. 
Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()

A.BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. 
B.BPDU guard can guarantee proper selection of the root bridge.
C.BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
D.BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
E.None of the other alternatives apply

3.單項選擇題

Refer to the exhibit. 

What is the sequence of events when a VoIP call is placed from IP phone P1 to IP phone P2? ()

A.RTP traffic is exchanged between IP phone P1 and IP phone P2. IP phone P1 alerts the CCM of off-hook state. CCM instructs IP phone P1 to provide dialtone. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2.
B.CCM instructs IP phone P1 to provide dialtone. IP phone P1 alerts the CCM of off-hook state. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2. RTP traffic is exchanged between IP phone P1 and IP phone P2. 
C.CCM instructs IP phone P1 to provide dialtone.IP phone P1 alerts the CCM of off-hook state. IP phone P1 passes digits to CCM. RTP traffic is exchanged between IP phone P1 and IP phone P2. CCM routes call to PSTN or IP phone P2.
D.IP phone P1 alerts the CCM of off-hook state. CCM instructs IP phone P1 to provide dialtone. IP phone P1 passes digits to CCM. CCM routes call to PSTN or IP phone P2. RTP traffic is exchanged between IP phone P1 and IP phone P2.

4.單項選擇題

Exhibit:

You work as a network administrator at. You study the exhibit carefully. In the wireless LAN all devices are configured with static WEP keys.
 What will happen if the access point receives packets sent by the wireless client adapter that are not encrypted with the appropriate key?()

A.The wireless client adapter will not be authenticated by the authentication server, but the access point deliver the packets to the intended receiver.
B.The wireless client adapter will not be able to send any packets to the access point.
C.The access point will discard the packets and never deliver them to the intended receiver.
D.The wireless client adapter will be authenticated by the authentication server and the access point will deliver the packets to the intended receiver.

5.單項選擇題

Exhibit: 

You work as a network technician at. Study the exhibit carefully. You are required configure the static WEP keys on the wireless client adapter using the Cisco ADU (Aironet Desktop Utility). 
What should you have in mind when doing this?()

A.Before the client adapter WEP key is generated, all wireless infrastructure devices (such as access points, servers, etc.) must be properly configured for LEAP authentication.
B.The client adapter WEP key should be generated by the AP and forwarded to the client adapter efore the client adapter can establish communication with the wireless network.
C.In infrastructure mode the client adapter WEP key must match the WEP key used by the access point. In ad hoc mode all client WEP keys within the wireless network must match each other.
D.The client adapter WEP key should be generated by the authentication server and forwarded to the client adapter before the client adapter can establish communication with the wireless network.
E.None of the other alternatives apply

最新試題

Which two statements about the various implementations of STP are true?()

題型:多項選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:單項選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:單項選擇題

During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:單項選擇題

How are STP timers and state transitions affected when a topology change occurs in an STP environment?()

題型:單項選擇題

Which three statements about STP timers are true?()

題型:多項選擇題

Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()

題型:單項選擇題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:單項選擇題