单项选择题
The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()
A.MAC spoofing
B.VLAN hopping
C.MAC address flooding
D.DHCP flooding
E.Session hijacking
相关考题
-
多项选择题
YouwanttoenhancethesecuritywithintheLANandpreventVLANhopping.Whattwostepscanbetakentohelppreventthis?()
A.Enable BPD guard
B.Disable CDP on ports where it is not necessary
C.Place unused ports in a common unrouted VLAN
D.Prevent automatic trunk configuration
E.Implement port security -
单项选择题
Refer to the exhibit. Based upon the configuration, you need to understand why the policy routingmatch counts are not increasing. Which would be the first logical step to take?Select the bestresponse.()
A.Confirm if there are other problematic route-map statements thatprecede divert
B.Check the access list for log hits
C.Check the routing table for 212.50.185.126
D.Remove any two of the set clauses(Multiple set clause entries will cause PBR to use therouting table.) -
单项选择题
Study the following graphic carefully Host1 and Host2, which belong to different VLANs, are in thesame subnet. According to the information displayed, which description is correct when trying toping from host to host?()
A.A trunk port should be configured on the link between CK-SW1 and CK-SW2 to pingsuccessfully
B.The two hosts should be in the same VLAN in order to ping successfully
C.A Layer 3 device is a must in order for the ping command to be successful
D.The ping command will be successful without any further configuration changes
