多项选择题
Which of the following are valid modes of accessing the data plane? (Choose all that apply.)()
A.Serial connection
B.Secure Shell
C.RADIUS
D.Simple Network Management Protocol
E.HTTP
F.Telnet
相关考题
-
多项选择题
WhichofthefollowingcharacteristicsdescribetheBPDUGuardfeature?(Chooseallthatapply.)()
A.A BPDU Guard port should only be configured on ports with PortFast enabled
B.BPDU Guard and PortFast should not be enabled on the same port.
C.BPDU Guard is used to ensure that superior BPDUs are not received on a switch port
D.A BPDU Guard port receiving a BPDU will go into err-disable state
E.A BPDU Guard port receiving a BPDU will be disabled
F.BPDU Guard can be enabled on any switch port -
单项选择题
AMACaddressfloodattackisoccurringontheLAN.Duringthisattack,numerousframesareforwardedtoaswitchwhichcausestheCAMtabletofilltocapacity.Howdoesthisactionbenefittheattacker?()
A.All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable
B.Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns
C.All traffic is redirected to the VLAN that the attacker used to flood the CAM table
D.All traffic is flooded out all ports and an attacker is able to capture all data
E.None of the other alternatives apply -
单项选择题
ThenetworkisbeingfloodedwithinvalidLayer2addresses,causingswitchCAMtablestobefilledandforcingunicasttraffictobetransmittedoutallswitchports.WhichtypeofLayer2attackisbeingusedhere?()
A.MAC spoofing
B.VLAN hopping
C.MAC address flooding
D.DHCP flooding
E.Session hijacking
