单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()AAll traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableBClients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsCAll traffic is redirected to the VLAN that the attacker used to flood the CAM tableDAll traffic is flooded out all ports and an attacker is able to capture all dataENone of the other alternatives apply

单选题
A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()
A

All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable

B

Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns

C

All traffic is redirected to the VLAN that the attacker used to flood the CAM table

D

All traffic is flooded out all ports and an attacker is able to capture all data

E

None of the other alternatives apply


参考解析

解析: 暂无解析

相关考题:

() of the villagers went hungry during the flood. A、NoB、NotC、NoneD、Every

After connecting a PC to an available port on a switch, you find that the PC can not access any of the resources on the LAN. No other PC's connected to the switch appear to be having any issues. What is the most likely cause for this problem?A.The router lacks a routing table entry for the new hostB.The host switch port is assigned to the incorrect VLANC.The host MAC address is incorrectly configuredD.A STP instance for the new host has not been initializedE.The switch does not have the MAC address hard coded in the CAM table.

During the IPv6 autoconfiguration, what does the device append to the 64- bit prefix that it receives from the router to create its IPv6 address?() A. a pseudora ndom generated numberB. its locally configured IPv4 addressC. the DHCP - supplied device IDD. its MAC address

Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?() A. To ma a known IP address to a MAC addressB. To map a known DLCI to a MAC addressC. To ma a known MAC address to an IP addressD. To ma a known DLCI address to a IP addressE. To ma a known IP address to a SPID addressF. To ma a known SPID address to a MAC address

Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?() A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to map a known IP address to a MAC addressC、to map known SPID to a MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to map a known MAC address to an IP address

Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。A、The MAC address of the NIC in Host 1B、The MAC address of the NIC in server 1C、The MAC address of the Fa0/0 interface of router R1D、The MAC address of the s0/0/0 interface of the router R2

What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to mapa known IP address to a MAC addressC、to map known SPID toa MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to mapa known MAC address to an IP address

During the IPv6 autoconfiguration, what does the device append to the 64- bit prefix that it receives from the router to create its IPv6 address?()A、a pseudora ndom generated numberB、its locally configured IPv4 addressC、the DHCP - supplied device IDD、its MAC address

Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()A、To ma a known IP address to a MAC addressB、To map a known DLCI to a MAC addressC、To ma a known MAC address to an IP addressD、To ma a known DLCI address to a IP addressE、To ma a known IP address to a SPID addressF、To ma a known SPID address to a MAC address

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

MAC(membrane attack complex)

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.F、 Configure port security to mitigate MAC address flooding  G、 None of the other alternatives apply

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

Which three statements are true about DAI?()A、DAI intercept all ARP packets on untrusted portsB、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.C、DAI is used to prevent against a DHCP Snooping attack.D、DAI forwards all ARP packets received on a trusted interface without any checks.E、DAI forwards all ARP packets on untrusted ports.F、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

During Company.com planning session, the network administrator discusses the requirements of having a persistent MAC address associated with the IP Service address.  How can this be accomplished using HACMP?()  A、 Enable routed to handle dynamic route creation.B、 Use IPAT via IP aliasing and define the required MAC address.C、 Add the Service IP Label to the /etc/cluster/ping_client_list.D、 Use IPAT via IP replacement and define the required MAC address.

单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()AThe attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.BFrames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.CThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.DThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.EThe attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.FFrames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.GNone of the other alternatives apply

单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()Asource and destination MAC addressBsource MAC address and destination network address onlyCsource and destination network address onlyDsource network address and destination MAC addressEsource and destination MAC address and source and destination network address

单选题Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。AThe MAC address of the NIC in Host 1BThe MAC address of the NIC in server 1CThe MAC address of the Fa0/0 interface of router R1DThe MAC address of the s0/0/0 interface of the router R2

多选题Which three statements are true about DAI?()ADAI intercept all ARP packets on untrusted portsBDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.CDAI is used to prevent against a DHCP Snooping attack.DDAI forwards all ARP packets received on a trusted interface without any checks.EDAI forwards all ARP packets on untrusted ports.FDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

单选题R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。AThe frame does not have MAC addresses.BThe source MAC address in the frame is the MAC address of the NIC of Host 1.CThe source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.DThe destination MAC address in the frame is the MAC address of the NICof server 1.EThe destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2

单选题During the IPv6 autoconfiguration, what does the device append to the 64- bit prefix that it receives from the router to create its IPv6 address?()Aa pseudora ndom generated numberBits locally configured IPv4 addressCthe DHCP - supplied device IDDits MAC address

单选题Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()ATo ma a known IP address to a MAC addressBTo map a known DLCI to a MAC addressCTo ma a known MAC address to an IP addressDTo ma a known DLCI address to a IP addressETo ma a known IP address to a SPID addressFTo ma a known SPID address to a MAC address

单选题What is the purpose of the inverse ARP?()Ato map a known DLCI to an IP addressBto mapa known IP address to a MAC addressCto map known SPID toa MAC addressDto map a known DLCI to a MAC addressEto map a known IP address to a SPIDFto mapa known MAC address to an IP address