CMS专题

单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A All traffic is tagged with a specific VLAN ID 

题目
单选题
A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()
A

All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable

B

Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns

C

All traffic is redirected to the VLAN that the attacker used to flood the CAM table

D

All traffic is flooded out all ports and an attacker is able to capture all data

E

None of the other alternatives apply

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

During the IPv6 autoconfiguration, what does the device append to the 64- bit prefix that it receives from the router to create its IPv6 address?()

A. a pseudora ndom generated number

B. its locally configured IPv4 address

C. the DHCP - supplied device ID

D. its MAC address


参考答案:D

第2题:

Which of one the following fields is contained within an IEEE Ethernet frame header?()

A. source and destination MAC address

B. source MAC address and destination network address only

C. source and destination network address only

D. source network address and destination MAC address

E. source and destination MAC address and source and destination network address


参考答案:A

第3题:

() of the villagers went hungry during the flood.

A、No

B、Not

C、None

D、Every


参考答案:C

第4题:

Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。

  • A、The MAC address of the NIC in Host 1
  • B、The MAC address of the NIC in server 1
  • C、The MAC address of the Fa0/0 interface of router R1
  • D、The MAC address of the s0/0/0 interface of the router R2

正确答案:C

第5题:

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A.denial of service

B.brute force

C.reconnaissance

D.Trojan horse


参考答案:A

第6题:

Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()

A. To ma a known IP address to a MAC address

B. To map a known DLCI to a MAC address

C. To ma a known MAC address to an IP address

D. To ma a known DLCI address to a IP address

E. To ma a known IP address to a SPID address

F. To ma a known SPID address to a MAC address


参考答案:D

第7题:

Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?()

A.the MAC address of the seiver network interface

B.the MAC address of host A

C.the MAC address of router interface e 1

D.the MAC address of router interface e0


参考答案:D

第8题:

After connecting a PC to an available port on a switch, you find that the PC can not access any of the resources on the LAN. No other PC's connected to the switch appear to be having any issues. What is the most likely cause for this problem?

A.The router lacks a routing table entry for the new host

B.The host switch port is assigned to the incorrect VLAN

C.The host MAC address is incorrectly configured

D.A STP instance for the new host has not been initialized

E.The switch does not have the MAC address hard coded in the CAM table.


正确答案:B
解析:Explanation:VirtualLANsbreakupbroadcastdomainsinalayer-twoswitchedinternetwork.IfahostisinadifferentVLANthenthenetworkservicesitneedstouse,thepacketsmustgothrougharouter.Ifroutingdoesnottakeplace,thePCwillbeunabletocommunicatewithanyotherdevicesnotinthesameVLAN.AnswerBisthebestanswerforthisquestion.IncorrectAnswers:A.ThePCisunabletocommunicatewithotherLANusers.Norouterneedstoevenbeinstalledforthistowork.C,E.TheMACaddressofthePCdoesnotneedtobeenteredmanuallyintotheswitch.TheswitchwilldynamicallylearnoftheMACaddressofthePC.D.TheSTPalgorithmdoesnotneedtohaveanyendhostinformationaddedinorderforittowork.

第9题:

What is the purpose of the inverse ARP?()

  • A、to map a known DLCI to an IP address
  • B、to map a known IP address to a MAC address
  • C、to map known SPID to a MAC address
  • D、to map a known DLCI to a MAC address
  • E、to map a known IP address to a SPID
  • F、to map a known MAC address to an IP address

正确答案:A

第10题:

What is the purpose of the inverse ARP?()

  • A、to map a known DLCI to an IP address
  • B、to mapa known IP address to a MAC address
  • C、to map known SPID toa MAC address
  • D、to map a known DLCI to a MAC address
  • E、to map a known IP address to a SPID
  • F、to mapa known MAC address to an IP address

正确答案:A

更多相关问题