多选题DHCP Snooping是一种DHCP安全特性,可以用于防御多种攻击,其中包括()A防御改变CHADOR值的饿死攻击B防御DHCP仿冒者攻击C防御TCpflag攻击D防御中间人攻击和IP/MACSpoofing攻击
多选题
DHCP Snooping是一种DHCP安全特性,可以用于防御多种攻击,其中包括()
A
防御改变CHADOR值的饿死攻击
B
防御DHCP仿冒者攻击
C
防御TCpflag攻击
D
防御中间人攻击和IP/MACSpoofing攻击
参考解析
解析:
暂无解析
相关考题:
(3)动态主机配置协议DHCP是对BOOTP协议的扩充,DHCP与BOOTP的主要区别是 DHCP具有 【l3】 机制。DHCP协议支持的中继代理(relay agent)是一种 【14】 ,它可以在不同的网段之间传送报文。DHCP具有多种地址分配方案,对于移动终端(比如笔记本电脑)最适合的分配方案是 【15】 。使用Windows 2000操作系统的DHCP 客户机,如果启动时无法与DHCP服务器通信,它 【16】 。因为DHCP报文是装入 【17】 协议数据单元中传送的,所以它是不安全的。【13】A)动态地址绑定和租约B)报文扩充C)配置参数提交D)中继代理
中间人攻击或IP/MAC Spoofing攻击都会导致信息泄露等危害,且在内网中比较常见。为了防止中间人攻击或IP/MAC Spoofing攻击,可以采取的配置方法有:() A.配置Trusted/Untrusted接口。B.限制交换机接口上允许学习到的最多MAC地址数目。C.开启DHCP snooping检查DHCP REQUEST报文中CHADDR字段的功能。D.在交换机上配置DHCP snooping与DAI或IPSG进行联动。
对于此段配置描述错误的是() A.配置GigabitEthernet0/0/1接口为信任接口。B.如果GigabitEthernet0/0/1接口收到的DHCF请求报文中,没有OPTION82的SUBOPTION1信息,则设备会生成OPTION82,并插入到报文中C.开启DHCP Snooping配置可以用来防止DHCP server仿冒者攻击。D.开启DHCP Snooping配置可以用来防止ARP欺骗攻击
自举协议(BOOTP)是DHCP之前开发的主机配置协议,作为对BOOTP协议的扩充,动态主机配置协议DHCP与BOOTP的主要区别是DHCP具有(66)机制。DHCP协议支持的中继代理(Relay Agent)是一种(67),它可以在不同的网段之间传送报文。DHCP具有多种地址分配方案,移动终端(比如笔记本电脑)最适合的分配方案是(68)。使用Windows 2000操作系统的DHCP客户机,如果启动时无法与DHCP服务器通信,它将(69)。因为DHCP报文是装入(70)数据单元中传送的,所以它是不安全的。A.动态地址绑定和租约B.报文扩充C.配置参数提交D.中继代理
DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,以下正确的是()。 A.DHCP Snooping绑定表分为动态绑定表和静态绑定表B.DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文C.静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D.在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息
阅读以下说明,回答问题1~3,将解答填入答题纸的对应栏内。某公司的网络拓扑结构如图3-1所示。其中的DHCP server安装的Linux系统。【问题2】(6分)若内部网络PC1上用户私自安装了dhcp服务器,则可能导致内网的用户无法获得正确的地址。要解决这个问题,可以在交换机上开启 (6) 功能,通过这种方式将交换机的(7)即接口设置为(8)接口。(6)备选答案:A、dhcp snooping B、dhcp relay C、dhcp discover D、dhcp unicast(8)备选答案:A、trust B、untrust C、dmz D、snooping
在启动了DHCP的网络有可能会发生什么类型的攻击?()A、攻击者使用相同的IP地址以造成IP冲突B、攻击者截取客户端发出的DHCP单播请求并修改报文内容C、攻击者冒充DHCP服务器D、攻击者冒充DHCP客户端
ARP-CHECK功能检查ARP报文合法性的来源有()A、IP+MAC的端口安全B、DHCP Snooping+IP SourceguardC、dot1x授权D、DHCP Snooping表
Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?()A、DHCP requests will be switched in the software, which may result in lengthy response times.B、The switch will run out of ACL hardware resources.C、All DHCP requests will pass through the switch untested.D、The DHCP server reply will be dropped and the client will not be able to obtain an IP address.
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()A、 DHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.B、 When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.C、 The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.D、 Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.E、 Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.
DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()A、 validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP serversB、 intercepts all ARP requests and responses on untrusted portsC、 builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addressesD、 uses the DHCP snooping binding database to validate subsequent requests from untrusted hostsE、 limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry
DHCP监听(DHCPSnooping)是一种DHCP安全特性,可以有效防范DHCPSnooping攻击,以下哪条不是该安全特性的描述()。A、比较DHCP请求报文的(报文头里的)源MAC地址和(报文内用里的)DHCP客户机的硬件地址(即CHADDR字段)是否一致B、将交换机端口划分为信任端口和非信任端口两类C、限制端口被允许访问的MAC地址的最大条目D、对端口的DHCP报文进行限速
多选题Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()AAttacker sends multiple DHCP requests flooding DHCP serverBAttacker connects rogue server initiating DHCP requestsCAttacker connects rogue server replying to DHCP requestsDAttacker sends DHCP jam signal causing DHCP server to crashEAttacker sends gratuitous ARP replies, thereby jamming the DHCP serverFAttacker sends unsolicited DHCP replies, thereby jamming the DHCP server
单选题DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,下列描述错误的是()ADHCP Snooping绑定表分为动态绑定表和静态绑定表BDHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCPReply报文C静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D在二层上应用DHCP Snooping,不配置Option82功能也可以获得绑定表所需的接门信息
多选题DHCP Snooping是一种DHCP安全特性,可以用于防御一些攻击,下列哪些是DHCP Snooping能够防御的攻击()。A防御改变CHADDR值的饿死攻击B防御DHCP仿冒者攻击C防御TCP flag攻击D防御中间人攻击和IP/MAC Spoofing攻击
多选题DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,以下正确的是()。ADHCP Snooping绑定表分为动态绑定表和静态绑定表BDHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文C静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息
多选题As the network technician at Company, you need to configure DHCP snooping on a new switch. Which three steps are required? ()AConfigure the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages.BConfigure DHCP snooping globally.CConfigure the switch as a DHCP server.DConfigure DHCP snooping on an interface.EConfigure all interfaces as DHCP snooping trusted interfaces.FConfigure DHCP snooping on a VLAN or range of VLANs.
多选题DHCP Snooping是一种DHCP安全特性,可以用于防御多种攻击,其中包括()A防御改变CHADOR值的饿死攻击B防御DHCP仿冒者攻击C防御TCpflag攻击D防御中间人攻击和IP/MACSpoofing攻击
单选题中间人攻击或IP/MAC Spoofing攻击会导致信息泄露等危害,在内网中比较常见,为了防止中间人攻击或IP/MAC Spoofing攻击,可以采取的方法有()。A配置Trusted/Untrusted接口B限制交换机接口上允许学习到的最多MAC地址数目C使用DHCP Snooping检查DHCP REQUEST报文中CHADDR字段的功能D在交换机上配置DHCP Snooping功能
单选题中间人攻击或IP/MACSpoofing攻击都会导致信息泄露等危害,且在内网中比较觉。为了防止中间人攻击或IP/MACSpoofing攻击,可以采取的配置方法有:()A配置trust/untrusted接口B限制交换机接口上允许学习到的最多MAC地址数目C开启DHCPSnooping检查DHCP REQUEST报文中CHADOR字段的功能D在交换机上配置DHCP Snooping域DAI或IPSG进行联动
多选题Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()ADHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.BWhen you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.CThe switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.DGlobally disabling DHCP snooping removes all DHCP snooping configuration on the switch.EGlobally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.