Attacker sends multiple DHCP requests flooding DHCP server
Attacker connects rogue server initiating DHCP requests
Attacker connects rogue server replying to DHCP requests
Attacker sends DHCP jam signal causing DHCP server to crash
Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
第1题:
A. DNS
B. WINS
C. FTP
D. DHCP
第2题:
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
第3题:
As the network technician at Company, you need to configure DHCP snooping on a new switch. Which three steps are required? ()
第4题:
Which CLI command enables the DHCP External Server function on an E-series router?()
第5题:
DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()
第6题:
Which of the following server types translates NetBIOS names to IP addresses?()
第7题:
In a Bridged 1483 network, which set of configuration commands allows the router to forward requests from the PC to an external DHCP server at 3.3.3.3?()
第8题:
You have a DHCP server that runs Windows Server 2008. The DHCP server has two network connections named LAN1 and LAN2. You need to prevent the DHCP server from responding to DHCP client requests on LAN2. The server must continue to respond to non-DHCP client requests on LAN2. What should you do? ()
第9题:
DHCP spoofing and SPAN cannot be used on the same port of a switch.
To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be updated by a dynamic ARP packet.
To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static entry pointing towards the DHCP server.
DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.
None of the other alternatives apply.
第10题:
validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
intercepts all ARP requests and responses on untrusted ports
builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry
第11题:
Database server
NTP server
DHCP server
SQLServer
DNS server
Domain name
第12题:
DHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.
When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.
The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.
Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.
Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.
第13题:
Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?()
第14题:
The Company security administrator wants to prevent DHCP spoofing. Which statement is true about DHCP spoofing operation?()
第15题:
When configuring a DHCP server, which of the following can the administrator define for DHCP users?()
第16题:
Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()
第17题:
Which of the following server types allows resolution of domain names to IP addresses?()
第18题:
How does the ERX Edge Router interact with an external DHCP server in a Bridged 1483 network?()
第19题:
In a Bridged 1483 network,which set of configuration commands allows the router to forward requests from the PC to an external DHCP server at 1.1.1.1?()
第20题:
Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages.
Configure DHCP snooping globally.
Configure the switch as a DHCP server.
Configure DHCP snooping on an interface.
Configure all interfaces as DHCP snooping trusted interfaces.
Configure DHCP snooping on a VLAN or range of VLANs.
第21题:
Attacker sends multiple DHCP requests flooding DHCP server
Attacker connects rogue server initiating DHCP requests
Attacker connects rogue server replying to DHCP requests
Attacker sends DHCP jam signal causing DHCP server to crash
Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
第22题:
DNS
WINS
FTP
DHCP
第23题:
It maintains DHCP leases on behalf of subscribers.
It initiates DHCP requests on behalf of subscribers.
It passes DHCP traffic to and from the server;you must configure static host routes.
It passes DHCP traffic to and from the server and inserts host routes into its routing table.
第24题:
DHCP requests will be switched in the software, which may result in lengthy response times.
The switch will run out of ACL hardware resources.
All DHCP requests will pass through the switch untested.
The DHCP server reply will be dropped and the client will not be able to obtain an IP address.