网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,以下正确的是()。
A

DHCP Snooping绑定表分为动态绑定表和静态绑定表

B

DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文

C

静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间

D

在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息


参考答案

参考解析
解析: 暂无解析
更多 “多选题DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,以下正确的是()。ADHCP Snooping绑定表分为动态绑定表和静态绑定表BDHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文C静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息” 相关考题
考题 中间人攻击或IP/MAC Spoofing攻击都会导致信息泄露等危害,且在内网中比较常见。为了防止中间人攻击或IP/MAC Spoofing攻击,可以采取的配置方法有:() A.配置Trusted/Untrusted接口。B.限制交换机接口上允许学习到的最多MAC地址数目。C.开启DHCP snooping检查DHCP REQUEST报文中CHADDR字段的功能。D.在交换机上配置DHCP snooping与DAI或IPSG进行联动。

考题 对于此段配置描述错误的是() A.配置GigabitEthernet0/0/1接口为信任接口。B.如果GigabitEthernet0/0/1接口收到的DHCF请求报文中,没有OPTION82的SUBOPTION1信息,则设备会生成OPTION82,并插入到报文中C.开启DHCP Snooping配置可以用来防止DHCP server仿冒者攻击。D.开启DHCP Snooping配置可以用来防止ARP欺骗攻击

考题 SX700系列交换机使能以下()功能可以防止DCP服务器私接。 A.MAC学习速率限制B. DHCP Snooping信任端口C.DHCP速率限制D.ARP速率限制

考题 DHCP relay又称为DHCP中继,下列关于DHCP relay的说法正确的是()。 A.DHCP协议多采用广播报文,如果出现多个子网则无法穿越。所以需要DHCP relay设备B.DHCP relay一定是一台交换机或者路由器C.DHCP relay设备可以是一台主机D.DHCP relay不改变报文内容,报文原样转发

考题 DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,以下正确的是()。 A.DHCP Snooping绑定表分为动态绑定表和静态绑定表B.DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文C.静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D.在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息

考题 阅读以下说明,回答问题1~3,将解答填入答题纸的对应栏内。 某公司的网络拓扑结构如图3-1所示。其中的DHCP server安装的Linux系统。 【问题2】(6分) 若内部网络PC1上用户私自安装了dhcp服务器,则可能导致内网的用户无法获得正确的地址。要解决这个问题,可以在交换机上开启 (6) 功能,通过这种方式将交换机的(7)即接口设置为(8)接口。 (6)备选答案: A、dhcp snooping B、dhcp relay C、dhcp discover D、dhcp unicast (8)备选答案: A、trust B、untrust C、dmz D、snooping

考题 ARP-CHECK功能检查ARP报文合法性的来源有()A、IP+MAC的端口安全B、DHCP Snooping+IP SourceguardC、dot1x授权D、DHCP Snooping表

考题 Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?()A、DHCP requests will be switched in the software, which may result in lengthy response times.B、The switch will run out of ACL hardware resources.C、All DHCP requests will pass through the switch untested.D、The DHCP server reply will be dropped and the client will not be able to obtain an IP address.

考题 Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

考题 The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.

考题 基站盲启的正确流程是()A、DHCP Discover-DHCP Offer-DHCP Request-DHCP AckB、DHCP Request-DHCP Ack-DHCP Discover-DHCP OfferC、DHCP Request-DHCP Offer-DHCP Discover-DHCP AckD、DHCP Discover-DHCP Ack-DHCP Request-DHCP Offer

考题 An attacker is launching a DoS attack on the Company network using a hacking tool designed to  exhaust the IP address space available from the DHCP servers for a period of time.  Which  procedure would best defend against this type of attack? ()A、 Configure only trusted interfaces with root guard.B、 Implement private VLANs (PVLANs) to carry only user traffic.C、 Implement private VLANs (PVLANs) to carry only DHCP traffic.D、 Configure only untrusted interfaces with root guard.E、 Configure DHCP spoofing on all ports that connect untrusted clients.F、 Configure DHCP snooping only on ports that connect trusted DHCP servers.G、 None of the other alternatives apply

考题 As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()A、using DHCP snoopingB、snooping the incoming 802.1Q VLAN tagC、using CDPD、snooping the CoS marking on the incoming frames

考题 Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()A、 DHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.B、 When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.C、 The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.D、 Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.E、 Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.

考题 DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()A、 validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP serversB、 intercepts all ARP requests and responses on untrusted portsC、 builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addressesD、 uses the DHCP snooping binding database to validate subsequent requests from untrusted hostsE、 limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry

考题 DHCP监听(DHCPSnooping)是一种DHCP安全特性,可以有效防范DHCPSnooping攻击,以下哪条不是该安全特性的描述()。A、比较DHCP请求报文的(报文头里的)源MAC地址和(报文内用里的)DHCP客户机的硬件地址(即CHADDR字段)是否一致B、将交换机端口划分为信任端口和非信任端口两类C、限制端口被允许访问的MAC地址的最大条目D、对端口的DHCP报文进行限速

考题 下面哪项不是防范ARP攻击的有效方法()。A、IP-MAC静态绑定B、使用类似port security的功能C、加强用户权限控制D、DHCP Snooping+DAI技术

考题 多选题Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()AAttacker sends multiple DHCP requests flooding DHCP serverBAttacker connects rogue server initiating DHCP requestsCAttacker connects rogue server replying to DHCP requestsDAttacker sends DHCP jam signal causing DHCP server to crashEAttacker sends gratuitous ARP replies, thereby jamming the DHCP serverFAttacker sends unsolicited DHCP replies, thereby jamming the DHCP server

考题 单选题Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?()A DHCP requests will be switched in the software, which may result in lengthy response times.B The switch will run out of ACL hardware resources.C All DHCP requests will pass through the switch untested.D The DHCP server reply will be dropped and the client will not be able to obtain an IP address.

考题 单选题DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,下列描述错误的是()A DHCP Snooping绑定表分为动态绑定表和静态绑定表B DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCPReply报文C 静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D 在二层上应用DHCP Snooping,不配置Option82功能也可以获得绑定表所需的接门信息

考题 多选题DHCP Snooping是一种DHCP安全特性,可以用于防御一些攻击,下列哪些是DHCP Snooping能够防御的攻击()。A防御改变CHADDR值的饿死攻击B防御DHCP仿冒者攻击C防御TCP flag攻击D防御中间人攻击和IP/MAC Spoofing攻击

考题 多选题DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,以下正确的是()。ADHCP Snooping绑定表分为动态绑定表和静态绑定表BDHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文C静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息

考题 单选题The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A  MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B  Port scanners are the most effective defense against dynamic ARP inspection.C  MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D  Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E  DHCP snooping sends unauthorized replies to DHCP queries.F  ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G  None of the other alternatives apply.

考题 多选题As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()AConfigure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.BConfigure DHCP snooping globally.CConfigure the switch as a DHCP server.DConfigure DHCP snooping on an interface.EConfigure all interfaces as DHCP snooping trusted interfaces.FConfigure DHCP snooping on a VLAN or range of VLANs.

考题 多选题Which three statements are true about DAI?()ADAI intercept all ARP packets on untrusted portsBDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.CDAI is used to prevent against a DHCP Snooping attack.DDAI forwards all ARP packets received on a trusted interface without any checks.EDAI forwards all ARP packets on untrusted ports.FDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

考题 多选题DHCP Snooping是一种DHCP安全特性,可以用于防御多种攻击,其中包括()A防御改变CHADOR值的饿死攻击B防御DHCP仿冒者攻击C防御TCpflag攻击D防御中间人攻击和IP/MACSpoofing攻击

考题 单选题中间人攻击或IP/MAC Spoofing攻击会导致信息泄露等危害,在内网中比较常见,为了防止中间人攻击或IP/MAC Spoofing攻击,可以采取的方法有()。A 配置Trusted/Untrusted接口B 限制交换机接口上允许学习到的最多MAC地址数目C 使用DHCP Snooping检查DHCP REQUEST报文中CHADDR字段的功能D 在交换机上配置DHCP Snooping功能

考题 多选题Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()ADHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.BWhen you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.CThe switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.DGlobally disabling DHCP snooping removes all DHCP snooping configuration on the switch.EGlobally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.