网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()
A

All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable

B

Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns

C

All traffic is redirected to the VLAN that the attacker used to flood the CAM table

D

All traffic is flooded out all ports and an attacker is able to capture all data

E

None of the other alternatives apply


参考答案

参考解析
解析: 暂无解析
更多 “单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD All traffic is flooded out all ports and an attacker is able to capture all dataE None of the other alternatives apply” 相关考题
考题 () of the villagers went hungry during the flood. A、NoB、NotC、NoneD、Every

考题 After connecting a PC to an available port on a switch, you find that the PC can not access any of the resources on the LAN. No other PC's connected to the switch appear to be having any issues. What is the most likely cause for this problem?A.The router lacks a routing table entry for the new hostB.The host switch port is assigned to the incorrect VLANC.The host MAC address is incorrectly configuredD.A STP instance for the new host has not been initializedE.The switch does not have the MAC address hard coded in the CAM table.

考题 During the IPv6 autoconfiguration, what does the device append to the 64- bit prefix that it receives from the router to create its IPv6 address?() A. a pseudora ndom generated numberB. its locally configured IPv4 addressC. the DHCP - supplied device IDD. its MAC address

考题 Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?() A. To ma a known IP address to a MAC addressB. To map a known DLCI to a MAC addressC. To ma a known MAC address to an IP addressD. To ma a known DLCI address to a IP addressE. To ma a known IP address to a SPID addressF. To ma a known SPID address to a MAC address

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

考题 Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?() A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0

考题 Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

考题 What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to map a known IP address to a MAC addressC、to map known SPID to a MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to map a known MAC address to an IP address

考题 Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。A、The MAC address of the NIC in Host 1B、The MAC address of the NIC in server 1C、The MAC address of the Fa0/0 interface of router R1D、The MAC address of the s0/0/0 interface of the router R2

考题 What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to mapa known IP address to a MAC addressC、to map known SPID toa MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to mapa known MAC address to an IP address

考题 During the IPv6 autoconfiguration, what does the device append to the 64- bit prefix that it receives from the router to create its IPv6 address?()A、a pseudora ndom generated numberB、its locally configured IPv4 addressC、the DHCP - supplied device IDD、its MAC address

考题 Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()A、To ma a known IP address to a MAC addressB、To map a known DLCI to a MAC addressC、To ma a known MAC address to an IP addressD、To ma a known DLCI address to a IP addressE、To ma a known IP address to a SPID addressF、To ma a known SPID address to a MAC address

考题 You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

考题 MAC(membrane attack complex)

考题 You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.F、 Configure port security to mitigate MAC address flooding  G、 None of the other alternatives apply

考题 Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

考题 Which three statements are true about DAI?()A、DAI intercept all ARP packets on untrusted portsB、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.C、DAI is used to prevent against a DHCP Snooping attack.D、DAI forwards all ARP packets received on a trusted interface without any checks.E、DAI forwards all ARP packets on untrusted ports.F、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

考题 During Company.com planning session, the network administrator discusses the requirements of having a persistent MAC address associated with the IP Service address.  How can this be accomplished using HACMP?()  A、 Enable routed to handle dynamic route creation.B、 Use IPAT via IP aliasing and define the required MAC address.C、 Add the Service IP Label to the /etc/cluster/ping_client_list.D、 Use IPAT via IP replacement and define the required MAC address.

考题 单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G None of the other alternatives apply

考题 单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A source and destination MAC addressB source MAC address and destination network address onlyC source and destination network address onlyD source network address and destination MAC addressE source and destination MAC address and source and destination network address

考题 单选题Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。A The MAC address of the NIC in Host 1B The MAC address of the NIC in server 1C The MAC address of the Fa0/0 interface of router R1D The MAC address of the s0/0/0 interface of the router R2

考题 多选题Which three statements are true about DAI?()ADAI intercept all ARP packets on untrusted portsBDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.CDAI is used to prevent against a DHCP Snooping attack.DDAI forwards all ARP packets received on a trusted interface without any checks.EDAI forwards all ARP packets on untrusted ports.FDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

考题 单选题R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。A The frame does not have MAC addresses.B The source MAC address in the frame is the MAC address of the NIC of Host 1.C The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.D The destination MAC address in the frame is the MAC address of the NICof server 1.E The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2

考题 单选题During the IPv6 autoconfiguration, what does the device append to the 64- bit prefix that it receives from the router to create its IPv6 address?()A a pseudora ndom generated numberB its locally configured IPv4 addressC the DHCP - supplied device IDD its MAC address

考题 单选题Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()A To ma a known IP address to a MAC addressB To map a known DLCI to a MAC addressC To ma a known MAC address to an IP addressD To ma a known DLCI address to a IP addressE To ma a known IP address to a SPID addressF To ma a known SPID address to a MAC address

考题 单选题What is the purpose of the inverse ARP?()A to map a known DLCI to an IP addressB to mapa known IP address to a MAC addressC to map known SPID toa MAC addressD to map a known DLCI to a MAC addressE to map a known IP address to a SPIDF to mapa known MAC address to an IP address