單項(xiàng)選擇題

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network. 
Which description correctly describes a MAC address flooding attack?()

A.The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
B.Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
C.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
D.The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
E.The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
F.Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
G.None of the other alternatives apply


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Study the exhibit shown below carefully.

In this scenario the service provider wants to ensure that switch S1 is the root switch for its own network and the network of . 
On which interfaces should root guard be configured to ensure that this happens?()
 

A.Interfaces 11 and 12
B.Interfaces 1, 2, 3, and 4
C.Interfaces 5 and 6
D.Interfaces 5, 6, 7, and 8
E.Interfaces 1 and 2
F.Interfaces 1, 3, 5, and 6

2.多項(xiàng)選擇題

In order to enhance worker productivity, a Cisco wireless network has been implemented at all    locations. 
Which three statements regarding WLAN are true?()

A.A WLAN client will operate in half-duplex mode.
B.The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
C.Ad hoc mode allows mobile clients to connect directly without an intermediate AP.
D.WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
E.A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
F.Another term for infrastructure mode is independent service set (IBSS).

3.單項(xiàng)選擇題

Switch 1 was configured as shown below:

Based on the output shown above, 
which statement is true? ()

A.IP traffic matching access list    is forwarded through VLANs 5-10.
B.All VLAN traffic in VLANs 5-10 that match access list    will be forwarded, and all else will be dropped.
C.IP traffic matching VLAN list 5-10 will be forwarded, and all other traffic will be dropped.
D.All VLAN traffic matching VLAN list 5-10 will be forwarded, and all traffic matching access list    is dropped.
E.None of the other alternatives apply

4.多項(xiàng)選擇題Which of the following are functions that are often provided by an ITSP but are not typically  provided by the PSTN?()

A. QoS
B. call setup and teardown
C. call routing
D. call supervision
E. audio signal compression

5.單項(xiàng)選擇題Which of the following is not information provided from an IP phone to a Catalyst switch using  CDP?()

A. device PoE requirements
B. device IP address
C. device voice VLAN ID
D. device platform

最新試題

How are STP timers and state transitions affected when a topology change occurs in an STP environment?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項(xiàng)選擇題

Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()

題型:?jiǎn)雾?xiàng)選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:?jiǎn)雾?xiàng)選擇題