网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
A

Attacker sends multiple DHCP requests flooding DHCP server

B

Attacker connects rogue server initiating DHCP requests

C

Attacker connects rogue server replying to DHCP requests

D

Attacker sends DHCP jam signal causing DHCP server to crash

E

Attacker sends gratuitous ARP replies, thereby jamming the DHCP server

F

Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()AAttacker sends multiple DHCP requests flooding DHCP serverBAttacker connects rogue server initiating DHCP requestsCAttacker connects rogue server replying to DHCP requestsDAttacker sends DHCP jam signal causing DHCP server to crashEAttacker sends gratuitous ARP replies, thereby jamming the DHCP serverFAttacker sends unsolicited DHCP replies, thereby jamming the DHCP server” 相关考题
考题 Which of the following is not among the basic features of a relational database?A.It does not matter what order the rows are in.B.It does not matter what order the columns are in.C.Different columns should have different column names.D.Different columns should have different data types.

考题 Regarding DHCP (dynamic host configuration protocol), which two of the following choices below are true? (Select two answer choices)A. The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.B. The DHCP Discover message uses UDP as the transport layer protocol.C. The DHCP Discover message uses a special Layer 2 multicast address as the destination address.D. The DHCP Discover message uses TCP as the transport layer protocol.E. The DHCP Discover message does not use a Layer 2 destination address.F. The DHCP Discover message does not require a transport layer protocol.

考题 Which of the following server types translates NetBIOS names to IP addresses?() A. DNSB. WINSC. FTPD. DHCP

考题 Which of the following words does NOT represent a "P" of three-P model A.Presentation. B.Practice. C.Pre-reading. D.Production.

考题 Which of the following words does NOT represent a "P" of three-P model A.Presentation. B.Practice. C.Pre-reading. D.Production.

考题 What are two methods of mitigating MAC address flooding attacks?()A、Place unused ports in a common VLAN.B、Implement private VLANs.C、Implement DHCP snooping.D、Implement port security.E、Implement VLAN access maps.

考题 Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?()A、DHCP requests will be switched in the software, which may result in lengthy response times.B、The switch will run out of ACL hardware resources.C、All DHCP requests will pass through the switch untested.D、The DHCP server reply will be dropped and the client will not be able to obtain an IP address.

考题 Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

考题 The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.

考题 You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.F、 Configure port security to mitigate MAC address flooding  G、 None of the other alternatives apply

考题 Regarding DHCP (dynamic host configuration protocol), which two of the following choices below are true?()A、The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.B、The DHCP Discover message uses UDP as the transport layer protocol.C、The DHCP Discover message uses a special Layer 2 multicast address as the destination address.D、The DHCP Discover message uses TCP as the transport layer protocol.E、The DHCP Discover message does not use a Layer 2 destination address.F、The DHCP Discover message does not require a transport layer protocol.

考题 In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()A、private VLANsB、port securityC、BPDU guardD、dynamic ARP inspectionE、DHCP snooping

考题 Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()A、 DHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.B、 When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.C、 The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.D、 Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.E、 Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.

考题 DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()A、 validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP serversB、 intercepts all ARP requests and responses on untrusted portsC、 builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addressesD、 uses the DHCP snooping binding database to validate subsequent requests from untrusted hostsE、 limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry

考题 Which of the following server types allows resolution of domain names to IP addresses?()A、DHCP serverB、DNS serverC、Web serverD、VLAN server

考题 Which of the following connector types does CAT5e require to connect it from a PC to a switch or router?()A、RJ-45B、RJ-11C、BNCD、LC

考题 A small office in which all workstations are using an ISP provided IP range has noticed a consistent decrease in network traffic speed. The decrease does not occur when the gateway to the ISP is disconnected. Which of the following should the administrator implement?() A、Multicast addressingB、Load balancingC、Address translationD、DHCP

考题 Which of the following server types translates NetBIOS names to IP addresses?()A、DNSB、WINSC、FTPD、DHCP

考题 多选题What are two methods of mitigating MAC address flooding attacks?()APlace unused ports in a common VLAN.BImplement private VLANs.CImplement DHCP snooping.DImplement port security.EImplement VLAN access maps.

考题 单选题Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?()A DHCP requests will be switched in the software, which may result in lengthy response times.B The switch will run out of ACL hardware resources.C All DHCP requests will pass through the switch untested.D The DHCP server reply will be dropped and the client will not be able to obtain an IP address.

考题 多选题Which two types of attacks are considered to be denial of service?() (Choose two.)Azombie agentsBSYN floodCIP packet fragmentsDWinNuke

考题 多选题Which of the following statements about declaration are true?()ADeclaration of primitive types such as boolean, byte and so on does not allocate memory space for the variable.BDeclaration of primitive types such as boolean, byte and so on allocates memory space for the variable.CDeclaration of nonprimitive types such as String, Vector and so on does not allocate memory space for the object.DDeclaration of nonprimitive types such as String, Vector ans so on allocates memory space for the object.

考题 单选题Which of the following connector types does CAT5e require to connect it from a PC to a switch or router?()A RJ-45B RJ-11C BNCD LC

考题 单选题The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A  MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B  Port scanners are the most effective defense against dynamic ARP inspection.C  MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D  Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E  DHCP snooping sends unauthorized replies to DHCP queries.F  ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G  None of the other alternatives apply.

考题 多选题As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()AConfigure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.BConfigure DHCP snooping globally.CConfigure the switch as a DHCP server.DConfigure DHCP snooping on an interface.EConfigure all interfaces as DHCP snooping trusted interfaces.FConfigure DHCP snooping on a VLAN or range of VLANs.

考题 单选题Which of the following server types translates NetBIOS names to IP addresses?()A  DNSB  WINSC  FTPD  DHCP

考题 多选题Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()ADHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.BWhen you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.CThe switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.DGlobally disabling DHCP snooping removes all DHCP snooping configuration on the switch.EGlobally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.