單項選擇題

Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and  internal users. For security reasons, the servers should not communicate with each other,  
although they are located on the same subnet. The servers do need, however, to communicate  with a database server located in the inside network.
 What configuration will isolate the servers  from each other? ()

A. The switch ports 3/1 and 3/2 will be defined as secondary VLAN community ports. The ports  connecting to the two firewalls will be defined as primary VLAN promiscuous ports.
B. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls will be defined as  primary VLAN promiscuous ports.
C. The switch ports 3/1 and 3/2 and the ports connecting to the two firewalls will be defined as  primary VLAN community ports.
D. The switch ports 3/1 and 3/2 will be defined as secondary VLAN isolated ports. The ports  connecting to the two firewalls will be defined as primary VLAN promiscuous ports.


您可能感興趣的試卷

你可能感興趣的試題

2.單項選擇題

Refer to the exhibit. 
What will happen to traffic within VLAN 14 with a source address of  172.16.10.5?()

A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.

3.單項選擇題

The Company security administrator wants to prevent DHCP spoofing. 
Which statement is true  about DHCP spoofing operation?()

A. DHCP spoofing and SPAN cannot be used on the same port of a switch.
B. To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.
C. To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.
D. DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.
E. None of the other alternatives apply.

4.多項選擇題

The Company security administrator is concerned with layer 2 network attacks. 
Which two  statements about these attacks are true? ()

A. ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
B. ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.
C. MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
D. ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.
E. MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

5.單項選擇題

You work as a network technician at Company. Your boss, Mrs.   , is interested in  
switch spoofing. 
She asks you how an attacker would collect information with VLAN hoping  through switch spoofing. You should tell her that the attacking station... ()

A、...uses VTP to collect VLAN information that is sent out and then tags itself with the domain  information in order to capture the data.
B、...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a  VLAN that would be inaccessible to the attacker through legitimate means.
C、...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the  trunk.
D、...tags itself with all usable VLANs to capture data that is passed through the switch, regardless  of the VLAN to which the data belongs.
E、None of the other alternatives apply

最新試題

What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()

題型:單項選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:單項選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:單項選擇題

Which three statements are true of the Link Aggregation Control Protocol (LACP)?()

題型:多項選擇題

Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()

題型:單項選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()

題型:單項選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:單項選擇題

Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()

題型:多項選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:單項選擇題