Cisco 813 Specifications Page 7

  • Download
  • Add to my manuals
  • Print
  • Page
    / 130
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 6
Ensurepass.com Easy Test! Easy Pass!
Download the complete collection of Exam's Real Q&As www.ensurepass.com
A. The spoof packets are inspected at the ingress port of switch SW_A and are permitted.
B. The spoof packets are inspected at the ingress port of switch SW_A and are dropped.
C. The spoof packets are not inspected at the ingress port of switch SW_A and are permitted.
D. The spoof packets are not inspected at the ingress port of switch SW_A and are dropped.
Correct Answer: C
QUESTION 9
Which statement is true about Layer 2 security threats?
A. MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure
against reconnaissance attacks that use Dynamic ARP Inspection to determine vulnerable
attack points.
B. DHCP snooping sends unauthorized replies to DHCP queries.
C. ARP spoofing can be used to redirect traffic to counter Dynamic ARP Inspection.
D. Dynamic ARP Inspection in conjunction with ARP spoofing can be used to counter DHCP
snooping attacks.
E. MAC spoofing attacks allow an attacking device to receive frames intended for a different
network host.
F. Port scanners are the most effective defense against Dynamic ARP Inspection.
Page view 6
1 2 3 4 5 6 7 8 9 10 11 12 ... 129 130

Comments to this Manuals

No comments