Refer to the exhibit. Dynamic ARP inspection (DAI) is enabled on switch SW_A only. Both Host_A and Host_B acquire their IP addresses from the DHCP server connected to switch SW_A.
What would the outcome be if Host_B initiated an ARP spoof attack toward Host_A ? ()
A. The spoof packets will be inspected at the ingress port of switch SW_A and will be permitted.
B. The spoof packets will not be inspected at the ingress port of switch SW_A and will be permitted.
C. The spoof packets will not be inspected at the ingress port of switch SW_A and will be dropped.
D. The spoof packets will be inspected at the ingress port of switch SW_A and will be dropped.
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit.
What will happen to traffic within VLAN 14 with a source address of 172.16.10.5? ()
A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.
A hacker on the Company network is attempting to hop onto a different VLAN.
Which two statements about VLAN hopping are true? ()
A. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
B. Configuring an interface with the "switchport mode dynamic" command will prevent VLAN hopping.
C. Attacks are prevented by utilizing the port-security feature.
D. Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
E. An end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.
The Company security administrator wants to prevent VLAN hopping on the network.
What is one method that can be used to do this? ()
A. Attacks are prevented by utilizing the port-security feature.
B. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
C. Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
D. An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
E. Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
The Company security administrator is concerned with VLAN hopping based attacks.
Which two statements about these attacks are true? ()
A. Attacks are prevented by utilizing the port-security feature.
B. An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
C. Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
D. An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
E. Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
Refer to the exhibit. PCs in VLAN 2 are not able to communicate with PCs in VLAN 3.
What could be the cause?()
A. IP routing is not enabled.
B. VTP is not configured correctly on the interfaces.
C. The command mls rp management-interface is missing.
D. The command mls rp ip must be disabled to enable the routing.
最新試題
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()
What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()
What is the configured priority value of the Vlan105’s group on DS2 ?()
Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()
Which two statements are true about BPDU port-guard and BPDU filtering?()
Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
Which statement is correct about the use of the virtual interface on a WLC ?()
Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()
Which three statements about STP timers are true?()