pany is implementing 802.1X in order to increase network security. In the use of 802.1X
access control,
which three protocols are allowed through the switch port before authentication takes place? ()
A. EAP-over-LAN
B. EAP MD5
C. STP
D. protocols not filtered by an ACL
E. CDP
F. TACACS+
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit.
What will happen to traffic within VLAN 14 with a source address of 172.16.10.5?()
A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.
The Company security administrator wants to prevent DHCP spoofing.
Which statement is true about DHCP spoofing operation?()
A. DHCP spoofing and SPAN cannot be used on the same port of a switch.
B. To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be updated by a dynamic ARP packet.
C. To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static entry pointing towards the DHCP server.
D. DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.
E. None of the other alternatives apply.
The Company security administrator is concerned with layer 2 network attacks.
Which two statements about these attacks are true? ()
A. ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
B. ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.
C. MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
D. ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.
E. MAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
You work as a network technician at Company. Your boss, Mrs. , is interested in
switch spoofing.
She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()
A、...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.
B、...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
C、...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.
D、...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
E、None of the other alternatives apply
You are responsible for increasing the security within the Company LAN. Of the following choices listed below,
which is true regarding layer 2 security and mitigation techniques? ()
A. Enable root guard to mitigate ARP address spoofing attacks.
B. Configure DHCP spoofing to mitigate ARP address spoofing attacks.
C. Configure PVLANs to mitigate MAC address flooding attacks.
D. Enable root guard to mitigate DHCP spoofing attacks.
E. Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.
F. Configure port security to mitigate MAC address flooding
G. None of the other alternatives apply
最新試題
What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()
Refer to the exhibit. What does the command channel-group 1 mode desirable do? ()
Which two statements are true about BPDU port-guard and BPDU filtering?()
Which two statements are true when the extended system ID feature is enabled? ()
If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()
What is the configured priority value of the Vlan105’s group on DS2 ?()
Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()