5.11.2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following switch attacks associates the attacker's MAC address with the IP address of the victim's devices?

ARP spoofing/poisoning

Drag each description on the left to the appropriate switch attack type on the right.

ARP spoofing/poisoning The source device sends frames to the attacker's MAC address instead of to the correct device.,Dynamic Trunking Protocol Should be disabled on the switch's end user (access) ports before implementing the switch configuration into the network.,MAC flooding Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called Fail Open Mode.,MAC spoofing Can be used to hide the identity of the attacker's computer or impersonate another device on the network.

Which of the following is a typical goal of MAC spoofing?

Bypass 802.1x port-based security

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so that only library computers are permitted connectivity to the internet. What can you do?

Configure port security on the switch.

Which of the following scenarios would typically utilize 802.1x authentication?

Controlling access through a switch

Which protocol should you disable on the user access ports of a switch?

DTP

Which of the following best describes the concept of a virtual LAN?

Devices on the same network logically grouped as if they were on separate networks.

Which of the following attacks, if successful, causes a switch to function like a hub?

MAC flooding

You manage a single subnet with three switches. They are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches?

Spanning Tree Protocol

When configuring VLANs on a switch, which type of switch ports are members of all VLANs defined on the switch?

Trunk ports


Set pelajaran terkait

Microeconomics Final Exam Study Guide

View Set

Biology: Concepts and Connections, 7th Edition, Chapter 8-11 to end

View Set

SAUNDERS CH 19: Growth, Development, and Stages of Life

View Set