多項(xiàng)選擇題

A hacker on the Company network is attempting to hop onto a different VLAN. 
Which two  statements about VLAN hopping are true? ()

A. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
B. Configuring an interface with the "switchport mode dynamic" command will prevent VLAN  hopping.
C. Attacks are prevented by utilizing the port-security feature.
D. Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.
E. An end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

The Company security administrator wants to prevent VLAN hopping on the network. 
What is one  method that can be used to do this?  ()

A. Attacks are prevented by utilizing the port-security feature.
B. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
C. Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.
D. An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.
E. Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

2.多項(xiàng)選擇題

The Company security administrator is concerned with VLAN hopping based attacks.
Which two  statements about these attacks are true? ()

A. Attacks are prevented by utilizing the port-security feature.
B. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
C. Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.
D. An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.
E. Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

3.單項(xiàng)選擇題

Refer to the exhibit. PCs in VLAN 2 are not able to communicate with PCs in VLAN 3.
 What could  be the cause?()

A. IP routing is not enabled.
B. VTP is not configured correctly on the interfaces.
C. The command mls rp management-interface is missing.
D. The command mls rp ip must be disabled to enable the routing.

4.單項(xiàng)選擇題

You are configuring a Cisco multilayer switch for the Company network.
 Which command would  you use to configure a port to act as a routed interface?()

A. ip routing
B. switchport mode trunk
C. no switchport
D. switchport trunk native vlan 1
E. None of the other alternatives apply

5.多項(xiàng)選擇題

Which of the following could be used to provide a Layer 3 data path between separate VLANs?()

A. VLAN trunking
B. An external router
C. An internal route processor
D. VLAN capable bridge
E. EtherChannel

6.多項(xiàng)選擇題

Inter-VLAN routing has been implemented in the Company network. In VLAN routing, 
what are  some of the disadvantages of designing a router-on-stick configuration? ()

A. InterVLAN routing cannot be filtered by the router.
B. The router becomes a single point of failure for the network.
C. Routers will not route STP BPDUs.
D. There is a possibility of inadequate bandwidth for each VLAN.
E. Additional overhead on the router can occur.
F. NetFlow Switching is required for InterVLAN accounting.

7.單項(xiàng)選擇題

The Company network needs to pass traffic between VLANs. 
Which device should be used to  accomplish this? ()

A. Hub
B. Switch
C. Router
D. Bridge
E. None of the other alternatives apply

8.單項(xiàng)選擇題

pany has implemented numerous multilayer switches that utilize FIB tables. 
Which statement  is true about the Forward Information Base (FIB) table?()

A. The FIB is derived from the IP routing table and is optimized for maximum lookup throughput.  
B. The FIB table is derived from the Address Resolution Protocol table, and it contains Layer 2  rewrite (MAC) information for the next hop.
C. When the FIB table is full, a wildcard entry redirects traffic to the Layer 3 engine.
D. The FIB lookup is based on the Layer 2 destination MAC address.
E. None of the other alternatives apply

9.單項(xiàng)選擇題

Refer to the exhibit. 
What type of attack is being defended against? ()

A. snooping attack
B. rogue device attack
C. STP attack
D. VLAN attack
E. spoofing attack
F. MAC flooding attack

10.單項(xiàng)選擇題

Refer to the exhibit. 
What will happen to traffic within VLAN 14 with a source address of  172.16.10.5?()

A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.

最新試題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:單項(xiàng)選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:單項(xiàng)選擇題

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()

題型:多項(xiàng)選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項(xiàng)選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項(xiàng)選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項(xiàng)選擇題

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

題型:單項(xiàng)選擇題

Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()

題型:單項(xiàng)選擇題

What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()

題型:單項(xiàng)選擇題

How are STP timers and state transitions affected when a topology change occurs in an STP environment?()

題型:單項(xiàng)選擇題