ARP-CHECK功能检查ARP报文合法性的来源有()A、IP+MAC的端口安全B、DHCP Snooping+IP SourceguardC、dot1x授权D、DHCP Snooping表

ARP-CHECK功能检查ARP报文合法性的来源有()

  • A、IP+MAC的端口安全
  • B、DHCP Snooping+IP Sourceguard
  • C、dot1x授权
  • D、DHCP Snooping表

相关考题:

中间人攻击或IP/MAC Spoofing攻击都会导致信息泄露等危害,且在内网中比较常见。为了防止中间人攻击或IP/MAC Spoofing攻击,可以采取的配置方法有:() A.配置Trusted/Untrusted接口。B.限制交换机接口上允许学习到的最多MAC地址数目。C.开启DHCP snooping检查DHCP REQUEST报文中CHADDR字段的功能。D.在交换机上配置DHCP snooping与DAI或IPSG进行联动。

对于此段配置描述错误的是() A.配置GigabitEthernet0/0/1接口为信任接口。B.如果GigabitEthernet0/0/1接口收到的DHCF请求报文中,没有OPTION82的SUBOPTION1信息,则设备会生成OPTION82,并插入到报文中C.开启DHCP Snooping配置可以用来防止DHCP server仿冒者攻击。D.开启DHCP Snooping配置可以用来防止ARP欺骗攻击

为了防止在交换网络中有人截获arp内容并冒充,我们采用哪个方式() A.端口安全B.arp拦截C.DHCP的监听D.bpdu的过滤

SX700系列交换机使能以下()功能可以防止DCP服务器私接。 A.MAC学习速率限制B. DHCP Snooping信任端口C.DHCP速率限制D.ARP速率限制

中间人攻击或IP/MAC Spoofing攻击会导致信息泄露等危害,在内网中比较常见,为了防止中间人攻击或IP/MAC Spoofing攻击,可以采取的方法有()。 A.配置Trusted/Untrusted接口B.限制交换机接口上允许学习到的最多MAC地址数目C.使用DHCP Snooping检查DHCP REQUEST报文中CHADDR字段的功能D.在交换机上配置DHCP Snooping功能

DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,以下正确的是()。 A.DHCP Snooping绑定表分为动态绑定表和静态绑定表B.DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文C.静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D.在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息

DHCP Snooping是一种DHCP安全特性,可以用于防御一些攻击,下列哪些是DHCP Snooping能够防御的攻击()。 A.防御改变CHADDR值的饿死攻击B.防御DHCP仿冒者攻击C.防御TCP flag攻击D.防御中间人攻击和IP/MAC Spoofing攻击

下面哪项不是防范ARP攻击的有效方法()。 A.IP-MAC静态绑定B.使用类似port security的功能C.加强用户权限控制D.DHCP Snooping+DAI技术

以下属于DHCP SERVER发出的报文有()A、DHCP DISCOVERB、DHCP ACKC、DHCP INFORMD、DHCP REQUEST

以下属于DHCPSERVER发出的报文有()。A、DHCP DISCOVERB、DHCP ACKC、DHCP INFORMD、DHCP REQUEST

为了防止在交换网络中有人截获arp内容并冒充,我们采用哪个方式()A、端口安全B、arp拦截C、DHCP的监听D、bpdu的过滤

Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()A、 Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.B、 Configure DHCP snooping globally.C、 Configure the switch as a DHCP server.D、 Configure DHCP snooping on an interface.E、 Configure all interfaces as DHCP snooping trusted interfaces.F、 Configure DHCP snooping on a VLAN or range of VLANs.

The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.

当DHCP客户端收到服务器的DHCP Offer报文时,要回复()报文A、DHCP ReleaseB、DHCP RequestC、DHCP OfferD、DHCP Ack

Which three statements are true about DAI?()A、DAI intercept all ARP packets on untrusted portsB、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.C、DAI is used to prevent against a DHCP Snooping attack.D、DAI forwards all ARP packets received on a trusted interface without any checks.E、DAI forwards all ARP packets on untrusted ports.F、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()A、 DHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.B、 When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.C、 The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.D、 Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.E、 Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.

DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()A、 validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP serversB、 intercepts all ARP requests and responses on untrusted portsC、 builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addressesD、 uses the DHCP snooping binding database to validate subsequent requests from untrusted hostsE、 limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry

DHCP监听(DHCPSnooping)是一种DHCP安全特性,可以有效防范DHCPSnooping攻击,以下哪条不是该安全特性的描述()。A、比较DHCP请求报文的(报文头里的)源MAC地址和(报文内用里的)DHCP客户机的硬件地址(即CHADDR字段)是否一致B、将交换机端口划分为信任端口和非信任端口两类C、限制端口被允许访问的MAC地址的最大条目D、对端口的DHCP报文进行限速

下面哪项不是防范ARP攻击的有效方法()。A、IP-MAC静态绑定B、使用类似port security的功能C、加强用户权限控制D、DHCP Snooping+DAI技术

多选题As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()AConfigure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.BConfigure DHCP snooping globally.CConfigure the switch as a DHCP server.DConfigure DHCP snooping on an interface.EConfigure all interfaces as DHCP snooping trusted interfaces.FConfigure DHCP snooping on a VLAN or range of VLANs.

多选题Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()AAttacker sends multiple DHCP requests flooding DHCP serverBAttacker connects rogue server initiating DHCP requestsCAttacker connects rogue server replying to DHCP requestsDAttacker sends DHCP jam signal causing DHCP server to crashEAttacker sends gratuitous ARP replies, thereby jamming the DHCP serverFAttacker sends unsolicited DHCP replies, thereby jamming the DHCP server

多选题DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,以下正确的是()。ADHCP Snooping绑定表分为动态绑定表和静态绑定表BDHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文C静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息

单选题DHCP Snooping是一种DHCP的安全特性,关于DHCP Snooping的说法,下列描述错误的是()ADHCP Snooping绑定表分为动态绑定表和静态绑定表BDHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCPReply报文C静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间D在二层上应用DHCP Snooping,不配置Option82功能也可以获得绑定表所需的接门信息

单选题The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B Port scanners are the most effective defense against dynamic ARP inspection.C MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E DHCP snooping sends unauthorized replies to DHCP queries.F ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G None of the other alternatives apply.

多选题Which three statements are true about DAI?()ADAI intercept all ARP packets on untrusted portsBDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.CDAI is used to prevent against a DHCP Snooping attack.DDAI forwards all ARP packets received on a trusted interface without any checks.EDAI forwards all ARP packets on untrusted ports.FDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

多选题Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()ADHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.BWhen you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.CThe switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.DGlobally disabling DHCP snooping removes all DHCP snooping configuration on the switch.EGlobally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.