7.4.11 Practice Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Drag each description on the left to the appropriate switch attack type on the right. 1.) ARP spoofing/poisoning 2.) Dynamic Trunking Protocol 3.) MAC flooding 4.) MAC spoofing

1.) The source device sends frames to the attacker's MAC address instead of to the correct device. 2.) Should be disabled on the switch's end user (access) ports before implementing the switch configuration in to the network. 3.) Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode. 4.) Can be used to hide the identity of the attacker's computer or impersonate another device on the network.

Which of the following BEST describes an ARP spoofing attack?

An attack that associates an attacker's MAC address with the IP address of a victim's device.

You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge?

Configure a priority number of 4096 for switch C.

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that's connected to the library network through an access port on a switch. You want to restrict access to the network so that only library computers are permitted connectivity to the internet. What can you do?

Configure port security on the switch.

Which of the following scenarios would typically utilize 802.1x authentication?

Controlling access through a switch.

Which of the following is a method of VLAN hopping?

Double tagging

An attacker hides his computer's identity by impersonating another device on a network. Which of the following attacks did the attacker MOST likely perform?

MAC spoofing attack

Which of the following switch attacks bypasses the normal functions of a router to communicate between VLANs and gain unauthorized access to traffic on another VLAN?

Switch spoofing

You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network?

Two

Which of the following attacks manipulates a switch's auto-negotiation setting to access a virtual local area network that's connected to the same switch as the attacker's virtual local area network?

VLAN spoofing


Set pelajaran terkait

Module 1: Introuction to Osha and the OSH Act Lesson 1

View Set

Оутель и Телефоунель 📞🤵🏼‍♂️🏨

View Set

Macroeconomics MyEconLab Ch.14 Homework

View Set