网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
What are two methods of mitigating MAC address flooding attacks?()
A
Place unused ports in a common VLAN.
B
Implement private VLANs.
C
Implement DHCP snooping.
D
Implement port security.
E
Implement VLAN access maps.
参考答案
参考解析
解析:
暂无解析
更多 “多选题What are two methods of mitigating MAC address flooding attacks?()APlace unused ports in a common VLAN.BImplement private VLANs.CImplement DHCP snooping.DImplement port security.EImplement VLAN access maps.” 相关考题
考题
A socket is composed of two addresses:(72)。A.MAC address and IP addressB.MAC address and port addressC.port number and IP addressD.E-mail address and IP address
考题
The PPP over Ethernet Discovery Stage determines which two parameters? ()(Choose two.)
A. session IDB. authentication serverC. IP address of the clientD. MAC address of the ERX router
考题
Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()
A. To ma a known IP address to a MAC addressB. To map a known DLCI to a MAC addressC. To ma a known MAC address to an IP addressD. To ma a known DLCI address to a IP addressE. To ma a known IP address to a SPID addressF. To ma a known SPID address to a MAC address
考题
Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?()
A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0
考题
What is the purpose of the inverse ARP?()
A.to map a known DLCI to an IP addressB.to mapa known IP address to a MAC addressC.to map known SPID toa MAC addressD.to map a known DLCI to a MAC addressE.to map a known IP address to a SPIDF.to mapa known MAC address to an IP address
考题
What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to map a known IP address to a MAC addressC、to map known SPID to a MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to map a known MAC address to an IP address
考题
What are two methods of mitigating MAC address flooding attacks?()A、Place unused ports in a common VLAN.B、Implement private VLANs.C、Implement DHCP snooping.D、Implement port security.E、Implement VLAN access maps.
考题
The PPP over Ethernet Discovery Stage determines which two parameters? ()(Choose two.)A、session IDB、authentication serverC、IP address of the clientD、MAC address of the ERX router
考题
What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to mapa known IP address to a MAC addressC、to map known SPID toa MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to mapa known MAC address to an IP address
考题
Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()A、To ma a known IP address to a MAC addressB、To map a known DLCI to a MAC addressC、To ma a known MAC address to an IP addressD、To ma a known DLCI address to a IP addressE、To ma a known IP address to a SPID addressF、To ma a known SPID address to a MAC address
考题
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply
考题
What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to map a known IP address to a MAC addressC、to map known SPID to a MACaddressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to map a known MAC address to an IP address
考题
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.F、 Configure port security to mitigate MAC address flooding G、 None of the other alternatives apply
考题
While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?()A、a routing protocol that is flooding updatesB、a flapping port that is generating BPDUs with the TCN bit setC、STP is not running on the switchD、a user that is downloading the output of the show-tech commandE、a corrupted switch CAM table
考题
When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()A、No more than one secure MAC address should be set.B、The default will be set.C、The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D、No value is needed if the switchport priority extend command is configured. E、No more than two secure MAC addresses should be set.
考题
The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
考题
Which two methods are used to assign an IP address to a WX device? ()(Choose two.)A、SSHB、TelnetC、WebViewD、device front panelE、serial console (command-line interface)
考题
多选题The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()AARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.BARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.CMAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.DARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.EMAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
考题
多选题What are two methods of accessing a Juniper enterprise router?()ARSHBHTTPSCconsoleDJ-Config
考题
多选题Which two methods are used to assign an IP address to a WX device? ()(Choose two.)ASSHBTelnetCWebViewDdevice front panelEserial console (command-line interface)
考题
单选题What is the purpose of the inverse ARP?()A
to map a known DLCI to an IP addressB
to map a known IP address to a MAC addressC
to map known SPID to a MACaddressD
to map a known DLCI to a MAC addressE
to map a known IP address to a SPIDF
to map a known MAC address to an IP address
考题
单选题Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()A
To ma a known IP address to a MAC addressB
To map a known DLCI to a MAC addressC
To ma a known MAC address to an IP addressD
To ma a known DLCI address to a IP addressE
To ma a known IP address to a SPID addressF
To ma a known SPID address to a MAC address
考题
多选题In a PPP over ATM service offering,which two methods are available for dynamically allocating an IP address to the customer's device?()ADHCPBRADIUS serverClocal address poolsDstatic IP assignmen
考题
单选题While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?()A
a routing protocol that is flooding updatesB
a flapping port that is generating BPDUs with the TCN bit setC
STP is not running on the switchD
a user that is downloading the output of the show-tech commandE
a corrupted switch CAM table
考题
单选题What is the purpose of the inverse ARP?()A
to map a known DLCI to an IP addressB
to mapa known IP address to a MAC addressC
to map known SPID toa MAC addressD
to map a known DLCI to a MAC addressE
to map a known IP address to a SPIDF
to mapa known MAC address to an IP address
考题
单选题When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()A
No more than one secure MAC address should be set.B
The default will be set.C
The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D
No value is needed if the switchport priority extend command is configured. E
No more than two secure MAC addresses should be set.
考题
多选题What are two valid Cluster load balancing methods? ()(Choose two.)AurlhashBbackup chainingCleast connectionsDfewest outstanding requests
热门标签
最新试卷