單項選擇題

The Company is concerned about Layer 2 security threats. 
Which statement is true about these  threats? ()

A. MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.
B. Port scanners are the most effective defense against dynamic ARP inspection.
C. MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.
D. Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.
E. DHCP snooping sends unauthorized replies to DHCP queries.
F. ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
G. None of the other alternatives apply.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Refer to the exhibit. Port security has been configured on the switch port Fa0/5. 
What would  happen if another device is connected to the port after the maximum number of devices has been  reached, even if one or more of the original MAC addresses are inactive?()

A. The port will permit the new MAC address because one or more of the original MAC addresses  are inactive.
B. The port will permit the new MAC address because one or more of the original MAC addresses  will age out.
C. Because the new MAC address is not configured on the port, the port will not permit the new  MAC address.
D. Although one or more of the original MAC addresses are inactive, the port will not permit the  new MAC address.

2.單項選擇題

Refer to the exhibit. 
What is the problem with this configuration?()

 

A. Spanning tree PortFast cannot be configured on a port where a voice VLAN is configured.
B. Sticky secure MAC addresses cannot be used on a port when a voice VLAN is configured.
C. Spanning tree PortFast cannot be configured on a port when a sticky secure MAC address is  used.
D. The switch port must be configured as a trunk.

3.多項選擇題

You need to configure port security on switch R1.
 Which two statements are true about this  technology? ()


A. Port security can be configured for ports supporting VoIP.
B. With port security configured, four MAC addresses are allowed by default.
C. The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
D.  Withsecurity configured, only one MAC addresses is allowed by default.  
E. Port security cannot be configured for ports supporting VoIP.


4.多項選擇題

Refer to the exhibit. Based on the running configuration that is shown for interface  FastEthernet0/2, 
what two conclusions can be deduced?()

A. Connecting a host with MAC address 0000.0000.4147 will move interface FastEthernet0/2 into  error disabled state.
B. The host with address 0000.0000.4141 is removed from the secure address list after 5 seconds  of inactivity.
C. The sticky secure MAC addresses are treated as static secure MAC addresses after the  running configuration is saved to the startup configuration and the switch is restarted.
D. Interface FastEthernet0/2 is a voice VLAN port.
E. The host with address 0000.0000.000b is removed from the secure address list after 300  seconds.

5.單項選擇題

Refer to the exhibit.
 Which interface or interfaces on switch SW_A can have the port security  feature enabled?()

A. Ports 0/1 and 0/2
B. The trunk port 0/22 and the EtherChannel ports
C. Ports 0/1, 0/2 and 0/3
D. Ports 0/1, 0/2, 0/3, the trunk port 0/22 and the EtherChannel ports
E. Port 0/1
F. Ports 0/1, 0/2, 0/3 and the trunk port 0/22

7.單項選擇題

VLAN maps have been configured on switch R1.
 Which of the following actions are taken in a  VLAN map that does not contain a match clause?  ()

A. Implicit deny feature at end of list.
B. Implicit deny feature at start of list.
C. Implicit forward feature at end of list
D. Implicit forward feature at start of list.

8.單項選擇題

Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and  internal users. For security reasons, the servers should not communicate with each other,  
although they are located on the same subnet. The servers do need, however, to communicate  with a database server located in the inside network.
 What configuration will isolate the servers  from each other? ()

A. The switch ports 3/1 and 3/2 will be defined as secondary VLAN community ports. The ports  connecting to the two firewalls will be defined as primary VLAN promiscuous ports.
B. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls will be defined as  primary VLAN promiscuous ports.
C. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls will be defined as  primary VLAN community ports.
D. The switch ports 3/1 and 3/2 will be defined as secondary VLAN isolated ports. The ports  connecting to the two firewalls will be defined as primary VLAN promiscuous ports.

10.單項選擇題

Refer to the exhibit. 
What will happen to traffic within VLAN 14 with a source address of  172.16.10.5?()

A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.

最新試題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:單項選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:單項選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項選擇題

Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()

題型:單項選擇題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:單項選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:單項選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:單項選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:單項選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:單項選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:單項選擇題