Cisco 813 Spécifications Page 7

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 130
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 6
Ensurepass.com Easy Test! Easy Pass!
Download the complete collection of Exam's Real Q&As www.ensurepass.com
A. The spoof packets are inspected at the ingress port of switch SW_A and are permitted.
B. The spoof packets are inspected at the ingress port of switch SW_A and are dropped.
C. The spoof packets are not inspected at the ingress port of switch SW_A and are permitted.
D. The spoof packets are not inspected at the ingress port of switch SW_A and are dropped.
Correct Answer: C
QUESTION 9
Which statement is true about Layer 2 security threats?
A. MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure
against reconnaissance attacks that use Dynamic ARP Inspection to determine vulnerable
attack points.
B. DHCP snooping sends unauthorized replies to DHCP queries.
C. ARP spoofing can be used to redirect traffic to counter Dynamic ARP Inspection.
D. Dynamic ARP Inspection in conjunction with ARP spoofing can be used to counter DHCP
snooping attacks.
E. MAC spoofing attacks allow an attacking device to receive frames intended for a different
network host.
F. Port scanners are the most effective defense against Dynamic ARP Inspection.
Vue de la page 6
1 2 3 4 5 6 7 8 9 10 11 12 ... 129 130

Commentaires sur ces manuels

Pas de commentaire