单选题The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()AMAC spoofingBVLAN hoppingCMAC address floodingDDHCP floodingESession hijacking

单选题
The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()
A

MAC spoofing

B

VLAN hopping

C

MAC address flooding

D

DHCP flooding

E

Session hijacking


参考解析

解析: 暂无解析

相关考题:

CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE. To obtain VLAN information from directly connected swticehsF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outages

TCP functions at the Open Systems Interconnection(OSI)transport layer, or Layer 4. Its chief responsibility is to ensure reliable end-to-end connectivity. IP, located one layer (1), at the OSI network layer, or Layer 3,communicates the addresses of each packet’s sender and receiver to the routers along the way .Routers and Layer 3 switches can read IP and other Layer 3 protocols. This information, combined with routing tables and other network intelligence, it takes to get across the room or around the world(2)TCP/IP.The routing process begins with an IP address that is(3)to the sending end station. End stations may be assigned permanent IP addresses or they may borrow them as needed from a Dynamic Host Configuration Protocol(DHCP)server or other service. If the sending end station determines that the destination address is not local, the packet goes to a first-hop router, typically one that is close and has been reassigned to the(4). The router inspects the packet’s IP address and performs a route table lookup to see if the destination end station resides on the local(physically connected)network, typically called an IP subnet. An IP subnet usually is assigned to each of the router’s network interfaces. If the destination IP address is local, the router searches an internal store of IP addresses and local-device media access control(MAC)addresses. This store is known as the Address Resolution Protocol(ARP) cache. ARP is the universal tool for(5)IP addresses to MAC addresses. If the destination’s MAC address appears, the router installs that MAC address in the packet header(removing its own MAC address because that’s no longer needed)and sends the packet to the destination end station.(1)A. upB. downC. sidewardD. back-fence(2)A. viaB. throughC. byD. through out(3)A. specialB. especialC. uniqueD. particular(4)A. accepterB. senderC. routerD. server(5)A. searchingB. lookingC. locatingD. matching

The sandbags stopped her property from________ A to be flooding ;B being flooded ;C being flooding

Both bridges are switches are being used throughout the Ezonexam LAN. Which of the following statements are true regarding bridges and switches in this network?(Choose 3)A. Switches are primarily software based while bridges are hardware based.B. Switches usually have a higher number of ports than most bridges.C. Bridges are frequently faster than switches.D. Bridges define broadcast domains while switches define collision domains.E. Both bridges and switches forward Layer 2 broadcasts.F. Both bridges and switches make forwarding decisions based on Layer 2 addresses.

TCP functions at the Open System Interconnection(OSI)(61)layer, or Layer 4. Its chief responsibility is to ensure(62)end-to-end connectivity. IP, located one layer down, at the OSI network layer, or Layer 3, communicates the addresses of each(63)sender and receiver to the routers along the way. Routers and Layer 3 switches can read IP and other Layer 3(64). This information, combined with routing tables and other network intelligence, is all it takes to get(65)the room or around the world via TCP/IP.A.transposeB.translateC.transmitD.transport

● TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.(71)A.network interface layer, internet layer, transport layer and application layerB.internet layer, network interface layer, transport layer and application layerC.network interface layer, transport layer, network interface layer and application layerD.application layer, transport layer, internet layer and network interface layer

Most IP layer-based proxy mechanisms,such as network address translation (NAT),only supportuni-directional proxy,from the internal network to external network(the Interned.The proxvestablishes the communication channel by (71) IP addresses.The IP addresses must be (72) .These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels,such as,multimedia applications.IP layer-based proxy mechanisms need additional software (73) for each application that uses (74) channels. SOCKS identifies communication targets through domain names,overcoming the restriction of Usina private IP addresses.SOCKS can use domain names to establish communication between separate LANs,with (75) IP addresses.(66)A.manufacturingB.manipulatingC.conductD.implement

TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.A.network interface layer, internet layer, transport layer and application layerB.internet layer, network interface layer, transport layer and application layerC.network interface layer, transport layer, network interface layer and application layerD.application layer, transport layer, internet layer and network interface layer

Which of the following are advantages of using Dynamic Host Configuration Protocol?() A. IP addresses can be managed from a central pointB. Computers can automatically get new addressing when moved to a different network segmentC. Media Access Control addresses can be changed automaticallyD. The network speed can automatically adjust based on the type of traffic being generatedE. The HOSTS file on the computer can be validated for proper entries

Which layer-function is mostly implemented in a network adapter( )。A.Physical layer and link layerB.Network layer and transport layerC.Physical layer and network layerD.Transport layer and application layer

Which two of these are characteristics of MPLS VPNs?() A. Layer 3 MPLS VPNs can forward only IP packetsB. Layer 2 MPLS VPNs can forward any network protocolC. MPLS label paths are automatically formed based on Layer 2 framesD. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

Which layer-function is mostly implemented in a network adapter?( ).A.Physical layer and link layerB.Network layer and transport layerC.Physical layer and.network layer D.Transport layer and application layer

You are the Cisco Network Designer in Cisco.com. In your company site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()A、Layer 2 modeB、Layer 2 Edge modeC、Layer 3 modeD、Layer 3 In-Band mode

Which of the following layers is associated with the physical hardware address of a network node?()A、Layer 1B、Layer 2C、Layer 6D、Layer 7

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()A、MAC spoofingB、VLAN hoppingC、MAC address floodingD、DHCP floodingE、Session hijacking

You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()A、It resembles a Layer 2 bridge.B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C、Inline interfaces which have no IP addresses cannot be detected.D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

Which two of these are characteristics of MPLS VPNs? ()A、 Layer 3 MPLS VPNs can forward only IP packetsB、 Layer 2 MPLS VPNs can forward any network protocolC、 MPL S label paths are automatically formed based on Layer 2 framesD、 Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE、 In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()A、 Layer 2 Edge modeB、 Layer 2 Central modeC、 Layer 2 In-Band modeD、 Layer 3 mode

Which of the following are advantages of using Dynamic Host Configuration Protocol?()A、IP addresses can be managed from a central pointB、Computers can automatically get new addressing when moved to a different network segmentC、Media Access Control addresses can be changed automaticallyD、The network speed can automatically adjust based on the type of traffic being generatedE、The HOSTS file on the computer can be validated for proper entries

单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()AThe attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.BFrames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.CThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.DThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.EThe attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.FFrames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.GNone of the other alternatives apply

多选题You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()AThe access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is trusted that it isentering the network with the appropriate tagBNo traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreCTraffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsDIP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offEMAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerFThe distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

单选题You are the Cisco Network Designer in Cisco.com. In your company site, a NAS is both physicall yand logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. Inwhich access mode has this NAS been configured to operate?()A Layer 2 modeB Layer 2 Edge modeC Layer 3 modeD Layer 3 In-Band mode

单选题The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()AMAC spoofingBVLAN hoppingCMAC address floodingDDHCP floodingESession hijacking

单选题At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()A Layer 2 Edge modeB Layer 2 Central modeC Layer 2 In-Band modeD Layer 3 mode

单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()AUpgrade the switchesBConfigure BPDU guardCConfigure VLAN access listsDConfigure port securityEConfigure Dynamic ARP inspection

多选题Which of the following correctly describe steps in the OSI data encapsulation process?()AThe transport layer divides a data stream into segments and may add reliability and flow control information.BThe data link layer adds physical source and destination addresses and an FCS to the segment.CPackets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.DPackets are created when the network layer adds Layer 3 addresses and control information to a segment.EThe presentation layer translates bits into voltages for transmission across the physical link.

单选题You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()AUpgrade the switchesBConfigure BPDU guardCConfigure VLAN access listsDConfigure port securityEConfigure Dynamic ARP inspection