單項選擇題Why would a rogue host that is running a DHCP server on a campus LAN network present a security risk?()

A.It may allocate IP addresses from an unknown subnet to the users.
B.All multicast traffic can be sniffed by using the DHCP multicast capabilities.
C.The CPU utilization of the first hop router can be overloaded by exploiting DHCP relay open ports.
D.A potential man-in-the-middle attack can be used against the clients.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題The classic Spanning Tree Protocol (802.1D 1998) uses which sequence of variables to determine the best received BPDU?()

A. 1) lowest root bridge id,2)lowest sender bridge id,3)lowest port id,4)lowest root path cost
B. 1) lowest root path cost,2)lowest root bridge id,3)lowest sender bridge id,4)lowest sender port id
C. 1) lowest root bridge id,2)lowest sender bridge id,3)lowest root path cost 4)owest sender port id
D. 1) lowest root bridge id,2)lowest root path cost,3)lowest sender bridge id,4)lowest sender port id

2.單項選擇題Which of these best describes the actions taken when a VTP message is received on a switch configured with the VTP mode "transparent"? ()

A. VTP updates are ignored and forwarded out all ports.
B. VTP updates are ignored and forwarded out trunks only.
C. VTP updates are made to the VLAN database and are forwarded out trunks only.
D. VTP updates are ignored and are not forwarded.

4.單項選擇題What is the purpose of the STP PortFast BPDU guard feature? ()

A.enforce the placement of the root bridge in the network
B.ensure that a port is transitioned to a forwarding state quickly if a BPDU is received
C.enforce the borders of an STP domain
D.ensure that any BPDUs received are forwarded into the STP domain

6.多項選擇題Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree Protocol IEEE 802.1D?()

A. Designated Root Cost
B. bridge ID priority
C. max age
D. bridge ID MAC address
E. Designated Root Priority
F. forward delay

7.單項選擇題Spanning Tree Protocol IEEE 802.1s defines the ability to deploy which of these?()

A. one global STP instance for all VLANs
B. one STP instance for each VLAN
C. one STP instance per set of VLANs
D. one STP instance per set of bridges

最新試題

What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link,but only allow eachindividual flow to use 1 MB/s?()

題型:單項選擇題

How does an IPv6 router deal with a packet that is larger than the outgoing interface MTU?()

題型:單項選擇題

Which two of these are used in the selection of a root bridge in a network utilizing Spanning Tree ProtocolIEEE 802.1 D?()

題型:多項選擇題

Which three options are valid ways to filter routes from a BGP peer?()

題型:多項選擇題

In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()

題型:單項選擇題

Which two statements about SA caching are true?()

題型:多項選擇題

Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is notconfigured as a route reflector?()

題型:單項選擇題

In PIM-SM what control plane signaling must a multicast source perform before it begins to send multicasttraffic to a group?()

題型:單項選擇題

Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message knowing that the MSDP router is also configured as an RP for the PIM domain?()

題型:單項選擇題

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()

題型:多項選擇題