多选题A hacker on the Company network is attempting to hop onto a different VLAN.  Which two  statements about VLAN hopping are true? ()AAn end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.BConfiguring an interface with the switchport mode dynamic command will prevent VLAN  hopping.CAttacks are prevented by utilizing the port-security feature.DConfiguring an interface with the switchport mode access command will prevent VLAN  hopping.EAn end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.

多选题
A hacker on the Company network is attempting to hop onto a different VLAN.  Which two  statements about VLAN hopping are true? ()
A

An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.

B

Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.

C

Attacks are prevented by utilizing the port-security feature.

D

Configuring an interface with the switchport mode access command will prevent VLAN  hopping.

E

An end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.


参考解析

解析: 暂无解析

相关考题:

--- Here is the company structure of Bi bury Systems. --- I see. Where does Kate fit____the company structure? A.withB.intoC.inD.onto

Which of the following devices transmits timed broadcasts onto an active network?() A. BridgeB. Unmanaged switchC. DHCP clientD. Firewal

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

Refer to the exhibit. Routing updates for the 192.168.1.0 network are being received from all three neighbors. Which statement is correct regarding the result of the con figuration shown? () A. The router will prefer the next hop of 172.16.1.1 for packets destined for the 192.168.1.0 network.B. The router will prefer the next hop of 172.26.1.1 for packets destined for the 192.168.1.0 network.C. The router will adve rtise the 192.168.1.0 network only to 172.30.1.1.D. The router will advertise the 192.168.1.0 network only to 172.26.1.1.E. The router will prefer the next hop of 172.26.1.1 for packets except those destined for the 192.168.1.0 network.

A:Here is the company structure of Bibury Systems. B:I see. Where does Kate fit()the company structure? A、withB、intoC、inD、onto

The network administrator would like to generate synthetic traffic using the Service AssuranceAgent contained in Cisco IOS. Which CiscoWorks network management application will be used toreport the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to-router) basis?()A、 nGenius Real-Time MonitorB、 CiscoViewC、 Device Fault ManagerD、 Internetwork Performance Monitor

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()A、The network was originated via redistribution of an interior gateway protocol into BGPB、The network was defined by a static routeC、The network was originated via a network or aggregate commandD、The network was learned via EBGPE、The network was learned via IBGP

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()A、The network was originated via redistribution of an interior gateway protocol into BGPB、The network was defined by a static routeC、The network was learned via IBGPD、The network was learned via EBGPE、The network was originated via a network or aggregate command

You need to design router redundancy on the Company network.  Which three protocols could be  chosen for IP routing redundancy to protect against first-hop router failure?()A、 GLBPB、 ICMPC、 MSTPD、 HSRPE、 VRRPF、 NHRP

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when using the "show ip bgp" c ommand?()A、The network was originated via redistribution of an interior gateway protocol into BGP.B、The network was defined by a static route.C、The network was learned via IBGP.D、The network was learned via EBGP.E、The network was originated via a network or aggregate command.

路由器不需要知道完整转发路径,只知道到达目的地的最近的下一跳如何走,这种报文中继转发的过程我们称之().A、hop by hop forwardingB、host by host forwardingC、router by router forwardingD、network by network forwarding

You want to implement router redundancy in the Company network using the best method  available.  Which protocol specified by RFC 2281 provides network redundancy for IP networks,  ensuring that user traffic immediately and transparently recovers from first-hop failures in network  edge devices or access circuits?()A、 ICMPB、 IRDPC、 HSRPD、 STPE、 None of the other alternatives apply

A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network()。A、a directly connected interface with an address of 192.168.10.254/24B、a static route to network 192.168.10.0/24C、a RIP update for network 192.168.10.0/24D、an OSPF update for network 192.168.0.0/16E、a default route with a next hop address of 192.168.10.1F、a static route to network 192.168.10.0/24 with a local serial interface configured as the next hop

You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  E、Trust boundaries define the firewall rules for QoS admission into a network.

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

Which of the following devices transmits timed broadcasts onto an active network?()A、BridgeB、Unmanaged switchC、DHCP clientD、Firewal

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.

多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()AThe network was originated via redistribution of an interior gateway protocol into BGPBThe network was defined by a static routeCThe network was originated via a network or aggregate commandDThe network was learned via EBGPEThe network was learned via IBGP

单选题The network administrator would like to generate synthetic traffic using the Service AssuranceAgent contained in Cisco IOS. Which CiscoWorks network management application will be used toreport the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to router) basis?()A nGenius Real-Time MonitorB CiscoViewC Device Fault ManagerD Internetwork Performance Monitor

多选题You need to design router redundancy on the Company network.  Which three protocols could be  chosen for IP routing redundancy to protect against first-hop router failure?()AGLBPBICMPCMSTPDHSRPEVRRPFNHRP

单选题You want to implement router redundancy in the Company network using the best method  available.  Which protocol specified by RFC 2281 provides network redundancy for IP networks,  ensuring that user traffic immediately and transparently recovers from first-hop failures in network  edge devices or access circuits?()A ICMPB IRDPC HSRPD STPE None of the other alternatives apply

多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when using the "show ip bgp" c ommand?()AThe network was originated via redistribution of an interior gateway protocol into BGP.BThe network was defined by a static route.CThe network was learned via IBGP.DThe network was learned via EBGP.EThe network was originated via a network or aggregate command.

单选题You are configuring a roaming user profile for a Scott Peters. You create a user account named ScottP on a Windows 2000 Server. You define a network profile directory path named //Server1/Profiles/%Username%. When Scott logs onto the computer, he receives the error message, "Windows cannot locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server. The details of network cannot be found". What should you do?()AChange the %Username% variable to ScottP.BCreate a home folder for the Client computer.CMap a device to network profile directory.DShare the directory, which holds his profile.

单选题A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network()。Aa directly connected interface with an address of 192.168.10.254/24Ba static route to network 192.168.10.0/24Ca RIP update for network 192.168.10.0/24Dan OSPF update for network 192.168.0.0/16Ea default route with a next hop address of 192.168.10.1Fa static route to network 192.168.10.0/24 with a local serial interface configured as the next hop

多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()AThe network was originated via redistribution of an interior gateway protocol into BGPBThe network was defined by a static routeCThe network was learned via IBGPDThe network was learned via EBGPEThe network was originated via a network or aggregate command