All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable
Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns
All traffic is redirected to the VLAN that the attacker used to flood the CAM table
All traffic is flooded out all ports and an attacker is able to capture all data
None of the other alternatives apply
第1题:
A. a pseudora ndom generated number
B. its locally configured IPv4 address
C. the DHCP - supplied device ID
D. its MAC address
第2题:
A. source and destination MAC address
B. source MAC address and destination network address only
C. source and destination network address only
D. source network address and destination MAC address
E. source and destination MAC address and source and destination network address
第3题:
A、No
B、Not
C、None
D、Every
第4题:
Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。
第5题:
A.denial of service
B.brute force
C.reconnaissance
D.Trojan horse
第6题:
A. To ma a known IP address to a MAC address
B. To map a known DLCI to a MAC address
C. To ma a known MAC address to an IP address
D. To ma a known DLCI address to a IP address
E. To ma a known IP address to a SPID address
F. To ma a known SPID address to a MAC address
第7题:
A.the MAC address of the seiver network interface
B.the MAC address of host A
C.the MAC address of router interface e 1
D.the MAC address of router interface e0
第8题:
After connecting a PC to an available port on a switch, you find that the PC can not access any of the resources on the LAN. No other PC's connected to the switch appear to be having any issues. What is the most likely cause for this problem?
A.The router lacks a routing table entry for the new host
B.The host switch port is assigned to the incorrect VLAN
C.The host MAC address is incorrectly configured
D.A STP instance for the new host has not been initialized
E.The switch does not have the MAC address hard coded in the CAM table.
第9题:
What is the purpose of the inverse ARP?()
第10题:
What is the purpose of the inverse ARP?()