网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()
A
All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable
B
Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns
C
All traffic is redirected to the VLAN that the attacker used to flood the CAM table
D
All traffic is flooded out all ports and an attacker is able to capture all data
E
None of the other alternatives apply
参考答案
参考解析
解析:
暂无解析
更多 “单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD All traffic is flooded out all ports and an attacker is able to capture all dataE None of the other alternatives apply” 相关考题
考题
After connecting a PC to an available port on a switch, you find that the PC can not access any of the resources on the LAN. No other PC's connected to the switch appear to be having any issues. What is the most likely cause for this problem?A.The router lacks a routing table entry for the new hostB.The host switch port is assigned to the incorrect VLANC.The host MAC address is incorrectly configuredD.A STP instance for the new host has not been initializedE.The switch does not have the MAC address hard coded in the CAM table.
考题
Which statement about vlan operation on cisco catalyst switches is true?()
A. when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.B. unkown unicast frames are retransmitted only to the ports that belong to the same vlanC. ports between switches should be configured in access mode so that vlans can span across the portsD. broadcast and multicast frames are retransmitted to ports that are configured on different vlan.
考题
What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。
A.The switch will not forward unicast frames.B.The switch will forward the frame to a specific port.C.The switch will return a copy of the frame out the source port.D.The switch will remove the destination MAC from the switch table.E.The switch will forward the frame to all ports except the port on which it was received.
考题
You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()A、...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.B、...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.C、...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.D、...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.E、None of the other alternatives apply
考题
Select the action that results from executing these commands. Switch(config-if)# switchport port-security. Switch(config-if)# switchport port-security mac-address sticky()A、A dynamically learned MAC address is saved in the startup-configuration file.B、A dynamically learned MAC address is saved in the running-configuration file.C、A dynamically learned MAC address is saved in the VLAN database.D、Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E、Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.
考题
A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A、All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB、Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC、All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD、All traffic is flooded out all ports and an attacker is able to capture all dataE、None of the other alternatives apply
考题
You need to configure a new Company Catalyst 3560 switch for a VOIP-enabled office. Which three statements are true about the voice VLAN feature on this switch?()A、The default CoS value for incoming traffic is set up to 0.B、The CoS value is trusted for 802.1p or 802.1q tagged traffic.C、PortFast is automatically disabled when a voice VLAN is configured.D、The voice VLAN feature is disabled by default.E、The IP phone accepts the priority of all tagged and untagged traffic and sets the CoS value to 4.F、When the voice VLAN feature is enabled, all untagged traffic is sent according to the default CoS priority of the port
考题
If a switch is working in the fail-open mode, what will happen when the switch’s CAM table fills to capacityand a new frame arrives?()A、A copy of the frame is forwarded out all switch ports other than the port the frame was received on.B、The frame is transmitted on the native VLAN.C、The switch sends a NACK segment to the frame’s source MAC address.D、The frame is dropped.
考题
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply
考题
What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()A、The switch will not forward unicast frames.B、The switch will forward the frame to a specific port.C、The switch will return a copy of the frame out the source port.D、The switch will remove the destination MAC from the switch table.E、The switch will forward the frame to all ports except the port on which it was received.
考题
Which statement about vlan operation on cisco catalyst switches is true?()A、when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.B、unkown unicast frames are retransmitted only to the ports that belong to the same vlanC、ports between switches should be configured in access mode so that vlans can span across the portsD、broadcast and multicast frames are retransmitted to ports that are configured on different vlan.
考题
While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?()A、a routing protocol that is flooding updatesB、a flapping port that is generating BPDUs with the TCN bit setC、STP is not running on the switchD、a user that is downloading the output of the show-tech commandE、a corrupted switch CAM table
考题
The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()A、MAC spoofingB、VLAN hoppingC、MAC address floodingD、DHCP floodingE、Session hijacking
考题
The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
考题
Which three statements are true about DAI?()A、DAI intercept all ARP packets on untrusted portsB、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.C、DAI is used to prevent against a DHCP Snooping attack.D、DAI forwards all ARP packets received on a trusted interface without any checks.E、DAI forwards all ARP packets on untrusted ports.F、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
考题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep
考题
单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G
None of the other alternatives apply
考题
多选题The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()AARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.BARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.CMAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.DARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.EMAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
考题
单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A
DoSB
SYN floodC
port scanningD
IP address sweep
考题
单选题What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()A
The switch will not forward unicast frames.B
The switch will forward the frame to a specific port.C
The switch will return a copy of the frame out the source port.D
The switch will remove the destination MAC from the switch table.E
The switch will forward the frame to all ports except the port on which it was received.
考题
单选题Select the action that results from executing these commands. Switch(config-if)# switchport port-security. Switch(config-if)# switchport port-security mac-address sticky()A
A dynamically learned MAC address is saved in the startup-configuration file.B
A dynamically learned MAC address is saved in the running-configuration file.C
A dynamically learned MAC address is saved in the VLAN database.D
Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E
Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.
考题
单选题You are the network administrator at Company and switch R1 is configured as shown below: Interface gigethernet 0/1 Switchport mode trunk Switchport trunk encapsulation dot1q Switchport trunk native vlan 5 If untagged frames are arriving on interface gigethernet 0/1 of R1, which of the following statement are correct?()A
Untagged frames are automatically assumed to be in VLAN 5.B
Untagged frames are defaulted to VLAN 1 traffic.C
Untagged frames are dropped because all packets are tagged when dot1q trunked.D
Untagged frames are determined on the other switchE
Untagged frames are not supported on 802.1Q trunks.
考题
多选题Which three statements are true about DAI?()ADAI intercept all ARP packets on untrusted portsBDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.CDAI is used to prevent against a DHCP Snooping attack.DDAI forwards all ARP packets received on a trusted interface without any checks.EDAI forwards all ARP packets on untrusted ports.FDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
考题
单选题If a switch is working in the fail-open mode, what will happen when the switch’s CAM table fills to capacityand a new frame arrives?()A
A copy of the frame is forwarded out all switch ports other than the port the frame was received on.B
The frame is transmitted on the native VLAN.C
The switch sends a NACK segment to the frame’s source MAC address.D
The frame is dropped.
考题
单选题While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?()A
a routing protocol that is flooding updatesB
a flapping port that is generating BPDUs with the TCN bit setC
STP is not running on the switchD
a user that is downloading the output of the show-tech commandE
a corrupted switch CAM table
考题
单选题You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()A
...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.B
...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.C
...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.D
...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.E
None of the other alternatives apply
考题
单选题Which statement about vlan operation on cisco catalyst switches is true?()A
when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.B
unkown unicast frames are retransmitted only to the ports that belong to the same vlanC
ports between switches should be configured in access mode so that vlans can span across the portsD
broadcast and multicast frames are retransmitted to ports that are configured on different vlan.
热门标签
最新试卷