网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()
A

The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

B

Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

C

The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.

D

The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.

E

The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

F

Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

G

None of the other alternatives apply


参考答案

参考解析
解析: 暂无解析
更多 “单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G None of the other alternatives apply” 相关考题
考题 __________you suspect something, I may as well tell you the whole truth.A. SinceB. UntilC. AfterD. While

考题 You have configured a Ezonexam switch as shown below:Ezonexam3(config-if) switchport port-securityEzonexam3(config-if) switchport port-security mac-address stickySelect the action below that results from executing these commands.A. A dynamically learned MAC address is saved in the VLAN database.B. A dynamically learned MAC address is saved in the startup-configuration file.C. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.D. A dynamically learned MAC address is saved in the running-configuration file.E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.F. None of the above

考题 You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with the IP protocol stack in your PC. Which of the following actions is most likely to confirm your diagnosis?A. ping 127.0.0.0B. ping 203.125.12.1C. telnet 127.0.0.1D. ping 127.0.0.1E. tracert 203.125.12.1F. None of the above

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

考题 While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A. pingB. traceC. show ip routeD. show interfaceE. show cdp neighbors

考题 Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?() A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0

考题 --May I know your address? --()ASure. Here you areBI have no ideaCIt’s far from here

考题 What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to map a known IP address to a MAC addressC、to map known SPID to a MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to map a known MAC address to an IP address

考题 --May I know your address? --()A、Sure. Here you areB、I have no ideaC、It’s far from here

考题 Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()A、To ma a known IP address to a MAC addressB、To map a known DLCI to a MAC addressC、To ma a known MAC address to an IP addressD、To ma a known DLCI address to a IP addressE、To ma a known IP address to a SPID addressF、To ma a known SPID address to a MAC address

考题 You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

考题 What keywords do you need to the access-list to provide to the logging message like source address and source mac address?()A、LogB、Log-inputC、Log-outputD、Logging

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

考题 While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A、pingB、traceC、show ip routeD、show interfaceE、show cdp neighbors

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks

考题 单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G None of the other alternatives apply

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A by using triggersB by using Data PumpC by using external tablesD by using anonymous PL/SQL blocks

考题 单选题While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A pingB traceC show ip routeD show interfaceE show cdp neighbors

考题 单选题What keywords do you need to the access-list to provide to the logging message like source address and source mac address?()A LogB Log-inputC Log-outputD Logging

考题 单选题--May I know your address? --()A Sure. Here you areB I have no ideaC It’s far from here

考题 单选题You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()A Add a Network Adapter.B Add a Legacy Network Adapter.C Configure a static MAC address.D Configure a dynamic MAC address.

考题 单选题P300 is the brainwave _____.A which may confirm that the person knows no details about the questionB lack of which may confirm that the person knows details about the questionC which may help prove that the suspect hasn’t committed a crimeD lack of which may mean that the suspect hasn’t committed a crime

考题 单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A source and destination MAC addressB source MAC address and destination network address onlyC source and destination network address onlyD source network address and destination MAC addressE source and destination MAC address and source and destination network address

考题 单选题You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()A ping 127.0.0.0B ping 203.125.12.1C telnet 127.0.0.1D ping 127.0.0.1E tracert 203.125.12.1

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A by using triggersB by using external tablesC by using anonymous PL/SQL blocksD by auditing all DML operations on the table

考题 单选题R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。A The frame does not have MAC addresses.B The source MAC address in the frame is the MAC address of the NIC of Host 1.C The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.D The destination MAC address in the frame is the MAC address of the NICof server 1.E The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2

考题 单选题Your network includes several virtual machines (VMs) that are distributed across a Windows Server 2008 R2 Hyper-V failover cluster. You need to be able to configure the VMs in a Network Load Balancing (NLB) cluster. What should you do on each VMs network adapter?()A Enable MAC address spoofing.B Disable MAC address spoofing.C Enable TCP Offload Engine(TOE).D Disable TCP Offload Engine(TOE).