多选题What are two methods of mitigating MAC address flooding attacks?()APlace unused ports in a common VLAN.BImplement private VLANs.CImplement DHCP snooping.DImplement port security.EImplement VLAN access maps.

多选题
What are two methods of mitigating MAC address flooding attacks?()
A

Place unused ports in a common VLAN.

B

Implement private VLANs.

C

Implement DHCP snooping.

D

Implement port security.

E

Implement VLAN access maps.


参考解析

解析: 暂无解析

相关考题:

A socket is composed of two addresses:(72)。A.MAC address and IP addressB.MAC address and port addressC.port number and IP addressD.E-mail address and IP address

The PPP over Ethernet Discovery Stage determines which two parameters? ()(Choose two.) A. session IDB. authentication serverC. IP address of the clientD. MAC address of the ERX router

Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?() A. To ma a known IP address to a MAC addressB. To map a known DLCI to a MAC addressC. To ma a known MAC address to an IP addressD. To ma a known DLCI address to a IP addressE. To ma a known IP address to a SPID addressF. To ma a known SPID address to a MAC address

Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?() A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0

What is the purpose of the inverse ARP?() A.to map a known DLCI to an IP addressB.to mapa known IP address to a MAC addressC.to map known SPID toa MAC addressD.to map a known DLCI to a MAC addressE.to map a known IP address to a SPIDF.to mapa known MAC address to an IP address

What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to map a known IP address to a MAC addressC、to map known SPID to a MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to map a known MAC address to an IP address

What are two methods of mitigating MAC address flooding attacks?()A、Place unused ports in a common VLAN.B、Implement private VLANs.C、Implement DHCP snooping.D、Implement port security.E、Implement VLAN access maps.

The PPP over Ethernet Discovery Stage determines which two parameters? ()(Choose two.)A、session IDB、authentication serverC、IP address of the clientD、MAC address of the ERX router

What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to mapa known IP address to a MAC addressC、to map known SPID toa MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to mapa known MAC address to an IP address

Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()A、To ma a known IP address to a MAC addressB、To map a known DLCI to a MAC addressC、To ma a known MAC address to an IP addressD、To ma a known DLCI address to a IP addressE、To ma a known IP address to a SPID addressF、To ma a known SPID address to a MAC address

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to map a known IP address to a MAC addressC、to map known SPID to a MACaddressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to map a known MAC address to an IP address

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.F、 Configure port security to mitigate MAC address flooding  G、 None of the other alternatives apply

While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?()A、a routing protocol that is flooding updatesB、a flapping port that is generating BPDUs with the TCN bit setC、STP is not running on the switchD、a user that is downloading the output of the show-tech commandE、a corrupted switch CAM table

When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A、No more than one secure MAC address should be set.B、The default will be set.C、The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D、No value is needed if the switchport priority extend command is configured. E、No more than two secure MAC addresses should be set.

The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

Which two methods are used to assign an IP address to a WX device? ()(Choose two.)A、SSHB、TelnetC、WebViewD、device front panelE、serial console (command-line interface)

多选题The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()AARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.BARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.CMAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.DARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.EMAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

多选题What are two methods of accessing a Juniper enterprise router?()ARSHBHTTPSCconsoleDJ-Config

多选题Which two methods are used to assign an IP address to a WX device? ()(Choose two.)ASSHBTelnetCWebViewDdevice front panelEserial console (command-line interface)

单选题What is the purpose of the inverse ARP?()Ato map a known DLCI to an IP addressBto map a known IP address to a MAC addressCto map known SPID to a MACaddressDto map a known DLCI to a MAC addressEto map a known IP address to a SPIDFto map a known MAC address to an IP address

单选题Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()ATo ma a known IP address to a MAC addressBTo map a known DLCI to a MAC addressCTo ma a known MAC address to an IP addressDTo ma a known DLCI address to a IP addressETo ma a known IP address to a SPID addressFTo ma a known SPID address to a MAC address

多选题In a PPP over ATM service offering,which two methods are available for dynamically allocating an IP address to the customer's device?()ADHCPBRADIUS serverClocal address poolsDstatic IP assignmen

单选题While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?()Aa routing protocol that is flooding updatesBa flapping port that is generating BPDUs with the TCN bit setCSTP is not running on the switchDa user that is downloading the output of the show-tech commandEa corrupted switch CAM table

单选题What is the purpose of the inverse ARP?()Ato map a known DLCI to an IP addressBto mapa known IP address to a MAC addressCto map known SPID toa MAC addressDto map a known DLCI to a MAC addressEto map a known IP address to a SPIDFto mapa known MAC address to an IP address

单选题When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()ANo more than one secure MAC address should be set.BThe default will be set.CThe IP phone should use a dedicated port, therefore only one MAC address is needed per port.DNo value is needed if the switchport priority extend command is configured. ENo more than two secure MAC addresses should be set.

多选题What are two valid Cluster load balancing methods? ()(Choose two.)AurlhashBbackup chainingCleast connectionsDfewest outstanding requests