單項(xiàng)選擇題

You work as a network technician at Company. Your boss, Mrs.   , is interested in  
switch spoofing. 
She asks you how an attacker would collect information with VLAN hoping  through switch spoofing. You should tell her that the attacking station... ()

A、...uses VTP to collect VLAN information that is sent out and then tags itself with the domain  information in order to capture the data.
B、...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a  VLAN that would be inaccessible to the attacker through legitimate means.
C、...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the  trunk.
D、...tags itself with all usable VLANs to capture data that is passed through the switch, regardless  of the VLAN to which the data belongs.
E、None of the other alternatives apply


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,
 which is true regarding layer 2 security and mitigation techniques? ()


A. Enable root guard to mitigate ARP address spoofing attacks.
B. Configure DHCP spoofing to mitigate ARP address spoofing attacks.
C. Configure PVLANs to mitigate MAC address flooding attacks.
D. Enable root guard to mitigate DHCP spoofing attacks.
E. Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
F. Configure port security to mitigate MAC address flooding  
G. None of the other alternatives apply


2.單項(xiàng)選擇題

Refer to the exhibit. An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to  establish a DHCP server for a man-in-middle attack.
 Which recommendation, if followed, would  mitigate this type of attack?()


A. All switch ports in the Building Access block should be configured as DHCP untrusted ports.  
B. All switch ports in the Building Access block should be configured as DHCP trusted ports.
C. All switch ports connecting to servers in the Server Farm block should be configured as DHCP  untrusted ports.
D. All switch ports connecting to hosts in the Building Access block should be configured as DHCP  trusted ports.
E. All switch ports in the Server Farm block should be configured as DHCP untrusted ports.
F. All switch ports connecting to hosts in the Building Access block should be configured as DHCP  untrusted ports.


3.多項(xiàng)選擇題

Refer to the exhibit. On the basis of the output generated by the show commands, 
which two  statements are true?()

A. Because it is configured as a trunk interface, interface gigabitethernet 0/1 does not appear in  the show vlan output.
B. VLAN 1 will not be encapsulated with an 802.1q header.
C. There are no native VLANs configured on the trunk.
D. VLAN 2 will not be encapsulated with an 802.1q header.
E. All interfaces on the switch have been configured as access ports.
F. Because it has not been assigned to any VLAN, interface gigabitethernet 0/1 does not appear in  the show vlan output.

4.單項(xiàng)選擇題

Refer to the exhibit. Based upon the output of show vlan on switch CAT2,
 what can we conclude  about interfaces Fa0/13 and Fa0/14? ()

A. that interfaces Fa0/13 and Fa0/14 are in VLAN 1
B. that interfaces Fa0/13 and Fa0/14 are down
C. that interfaces Fa0/13 and Fa0/14 are trunk interfaces
D. that interfaces Fa0/13 and Fa0/14have a domain mismatch with another switch
E. that interfaces Fa0/13 and Fa0/14have a duplex mismatch with another switch

5.多項(xiàng)選擇題

Refer to the exhibit. Switch P1S1 is not applying VLAN updates from switch P2S1.
 What are three  reasons why this is not occurring?()

A. Switch P2S1 is in server mode.
B. Switch P1S1 is in transparent mode.
C. The MD5 digests do not match.
D. The passwords do not match.
E. The VTP domains are different.
F. VTP trap generation is disabled on both switches.

6.多項(xiàng)選擇題

Refer to the show interface Gi0/1 switchport command output shown in the exhibit. 
Which two  statements are true about this interface?()

A. This interface is a member of a voice VLAN.
B. This interface is configured for access mode.
C. This interface is a dot1q trunk passing all configured VLANs.
D. This interface is a member of VLAN7.
E. This interface is a member of VLAN1.

8.多項(xiàng)選擇題

The Company administrator has issue the "show vlan id 5" command. 
What will this command  display? ()

A. Ports in VLAN 5
B. Utilization
C. VLAN information on port 0/5
D. Filters
E. MTU and type

10.單項(xiàng)選擇題

Refer to the exhibit. The switchport output in Figure 1 displays the default settings of interface  FastEthernet 0/13 on switch SW1. Figure 2 displays the desired interface settings. 
Which command sequence would configure interface FastEthernet 0/13 as displayed in Figure 2? ()

A. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode trunk  SW1(config-if)# switchport trunk native DATA SW1(config-if)# switchport trunk allowed vlan  1,10,20
B. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode dynamic  auto SW1(config-if)# switchport trunk native DATA SW1(config-if)# witchport trunk allowed vlan  add 1,10,20
C. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode dynamic  desirable SW1(config-if)# switchport trunk native vlan DATA SW1(config-if)# switchport trunk  allowed vlan 1,10,20
D. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode dynamic  desirable SW1(config-if)# switchport trunk native vlan 10 SW1(config-if)# switchport trunk allowed  vlan 1,10,20
E. SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode dynamic  Desirable SW1(config-if)# switchport trunk native vlan 10

最新試題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about the various implementations of STP are true?()

題型:多項(xiàng)選擇題

Which statement is correct about RSTP port roles?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements are true when the extended system ID feature is enabled? ()

題型:多項(xiàng)選擇題

Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()

題型:?jiǎn)雾?xiàng)選擇題

Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:?jiǎn)雾?xiàng)選擇題