MAC spoofing
VLAN hopping
MAC address flooding
DHCP flooding
Session hijacking
第1题:
TCP functions at the Open System Interconnection(OSI)(61)layer, or Layer 4. Its chief responsibility is to ensure(62)end-to-end connectivity. IP, located one layer down, at the OSI network layer, or Layer 3, communicates the addresses of each(63)sender and receiver to the routers along the way. Routers and Layer 3 switches can read IP and other Layer 3(64). This information, combined with routing tables and other network intelligence, is all it takes to get(65)the room or around the world via TCP/IP.
A.transpose
B.translate
C.transmit
D.transport
第2题:
Most IP layer-based proxy mechanisms,such as network address translation (NAT),only supportuni-directional proxy,from the internal network to external network(the Interned.The proxvestablishes the communication channel by (71) IP addresses.The IP addresses must be (72) .These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels,such as,multimedia applications.IP layer-based proxy mechanisms need additional software (73) for each application that uses (74) channels. SOCKS identifies communication targets through domain names,overcoming the restriction of Usina private IP addresses.SOCKS can use domain names to establish communication between separate LANs,with (75) IP addresses.
(66)
A.manufacturing
B.manipulating
C.conduct
D.implement
第3题:
A. IP addresses can be managed from a central point
B. Computers can automatically get new addressing when moved to a different network segment
C. Media Access Control addresses can be changed automatically
D. The network speed can automatically adjust based on the type of traffic being generated
E. The HOSTS file on the computer can be validated for proper entries
第4题:
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPLS label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
第5题:
You are the Cisco Network Designer in Cisco.com. In your company site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
第6题:
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
第7题:
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()
第8题:
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
第9题:
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
None of the other alternatives apply
第10题:
Layer 2 mode
Layer 2 Edge mode
Layer 3 mode
Layer 3 In-Band mode
第11题:
Layer 2 Edge mode
Layer 2 Central mode
Layer 2 In-Band mode
Layer 3 mode
第12题:
The transport layer divides a data stream into segments and may add reliability and flow control information.
The data link layer adds physical source and destination addresses and an FCS to the segment.
Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
The presentation layer translates bits into voltages for transmission across the physical link.
第13题:
● TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.
(71)A.network interface layer, internet layer, transport layer and application layer
B.internet layer, network interface layer, transport layer and application layer
C.network interface layer, transport layer, network interface layer and application layer
D.application layer, transport layer, internet layer and network interface layer
第14题:
TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.
A.network interface layer, internet layer, transport layer and application layer
B.internet layer, network interface layer, transport layer and application layer
C.network interface layer, transport layer, network interface layer and application layer
D.application layer, transport layer, internet layer and network interface layer
第15题:
Which layer-function is mostly implemented in a network adapter( )。
A.Physical layer and link layer
B.Network layer and transport layer
C.Physical layer and network layer
D.Transport layer and application layer
第16题:
第17题:
Which of the following layers is associated with the physical hardware address of a network node?()
第18题:
The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()
第19题:
Which two of these are characteristics of MPLS VPNs? ()
第20题:
Which of the following are advantages of using Dynamic Host Configuration Protocol?()
第21题:
The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is trusted that it isentering the network with the appropriate tag
No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
第22题:
MAC spoofing
VLAN hopping
MAC address flooding
DHCP flooding
Session hijacking
第23题:
Upgrade the switches
Configure BPDU guard
Configure VLAN access lists
Configure port security
Configure Dynamic ARP inspection
第24题:
Upgrade the switches
Configure BPDU guard
Configure VLAN access lists
Configure port security
Configure Dynamic ARP inspection