单选题The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()A MAC spoofingB VLAN hoppingC MAC ad

题目
单选题
The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()
A

MAC spoofing

B

VLAN hopping

C

MAC address flooding

D

DHCP flooding

E

Session hijacking


相似考题

4.TCP functions at the Open Systems Interconnection(OSI)transport layer, or Layer 4. Its chief responsibility is to ensure reliable end-to-end connectivity. IP, located one layer (1), at the OSI network layer, or Layer 3,communicates the addresses of each packet’s sender and receiver to the routers along the way .Routers and Layer 3 switches can read IP and other Layer 3 protocols. This information, combined with routing tables and other network intelligence, it takes to get across the room or around the world(2)TCP/IP.The routing process begins with an IP address that is(3)to the sending end station. End stations may be assigned permanent IP addresses or they may borrow them as needed from a Dynamic Host Configuration Protocol(DHCP)server or other service. If the sending end station determines that the destination address is not local, the packet goes to a first-hop router, typically one that is close and has been reassigned to the(4). The router inspects the packet’s IP address and performs a route table lookup to see if the destination end station resides on the local(physically connected)network, typically called an IP subnet. An IP subnet usually is assigned to each of the router’s network interfaces. If the destination IP address is local, the router searches an internal store of IP addresses and local-device media access control(MAC)addresses. This store is known as the Address Resolution Protocol(ARP) cache. ARP is the universal tool for(5)IP addresses to MAC addresses. If the destination’s MAC address appears, the router installs that MAC address in the packet header(removing its own MAC address because that’s no longer needed)and sends the packet to the destination end station.(1)A. upB. downC. sidewardD. back-fence(2)A. viaB. throughC. byD. through out(3)A. specialB. especialC. uniqueD. particular(4)A. accepterB. senderC. routerD. server(5)A. searchingB. lookingC. locatingD. matching

参考答案和解析
正确答案: B
解析: 暂无解析
更多“The network is being flooded with invalid Layer 2 addresses,”相关问题
  • 第1题:

    TCP functions at the Open System Interconnection(OSI)(61)layer, or Layer 4. Its chief responsibility is to ensure(62)end-to-end connectivity. IP, located one layer down, at the OSI network layer, or Layer 3, communicates the addresses of each(63)sender and receiver to the routers along the way. Routers and Layer 3 switches can read IP and other Layer 3(64). This information, combined with routing tables and other network intelligence, is all it takes to get(65)the room or around the world via TCP/IP.

    A.transpose

    B.translate

    C.transmit

    D.transport


    正确答案:D

  • 第2题:

    Most IP layer-based proxy mechanisms,such as network address translation (NAT),only supportuni-directional proxy,from the internal network to external network(the Interned.The proxvestablishes the communication channel by (71) IP addresses.The IP addresses must be (72) .These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels,such as,multimedia applications.IP layer-based proxy mechanisms need additional software (73) for each application that uses (74) channels. SOCKS identifies communication targets through domain names,overcoming the restriction of Usina private IP addresses.SOCKS can use domain names to establish communication between separate LANs,with (75) IP addresses.

    (66)

    A.manufacturing

    B.manipulating

    C.conduct

    D.implement


    正确答案:B

  • 第3题:

    Which of the following are advantages of using Dynamic Host Configuration Protocol?()

    A. IP addresses can be managed from a central point

    B. Computers can automatically get new addressing when moved to a different network segment

    C. Media Access Control addresses can be changed automatically

    D. The network speed can automatically adjust based on the type of traffic being generated

    E. The HOSTS file on the computer can be validated for proper entries


    参考答案:A, B

  • 第4题:

    Which two of these are characteristics of MPLS VPNs?()

    A. Layer 3 MPLS VPNs can forward only IP packets

    B. Layer 2 MPLS VPNs can forward any network protocol

    C. MPLS label paths are automatically formed based on Layer 2 frames

    D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames

    E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies


    参考答案:A, B

  • 第5题:

    You are the Cisco Network Designer in Cisco.com. In your company site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()

    • A、Layer 2 mode
    • B、Layer 2 Edge mode
    • C、Layer 3 mode
    • D、Layer 3 In-Band mode

    正确答案:A

  • 第6题:

    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

    • A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
    • D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
    • E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • G、None of the other alternatives apply

    正确答案:F

  • 第7题:

    You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()

    • A、It resembles a Layer 2 bridge.
    • B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
    • C、Inline interfaces which have no IP addresses cannot be detected.
    • D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

    正确答案:A,C

  • 第8题:

    At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()

    • A、 Layer 2 Edge mode
    • B、 Layer 2 Central mode
    • C、 Layer 2 In-Band mode
    • D、 Layer 3 mode

    正确答案:D

  • 第9题:

    单选题
    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()
    A

    The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    B

    Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    C

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.

    D

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.

    E

    The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    F

    Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    G

    None of the other alternatives apply


    正确答案: G
    解析: 暂无解析

  • 第10题:

    单选题
    You are the Cisco Network Designer in Cisco.com. In your company site, a NAS is both physicall yand logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. Inwhich access mode has this NAS been configured to operate?()
    A

     Layer 2 mode

    B

     Layer 2 Edge mode

    C

     Layer 3 mode

    D

     Layer 3 In-Band mode


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
    A

     Layer 2 Edge mode

    B

     Layer 2 Central mode

    C

     Layer 2 In-Band mode

    D

     Layer 3 mode


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which of the following correctly describe steps in the OSI data encapsulation process?()
    A

    The transport layer divides a data stream into segments and may add reliability and flow control information.

    B

    The data link layer adds physical source and destination addresses and an FCS to the segment.

    C

    Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

    D

    Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

    E

    The presentation layer translates bits into voltages for transmission across the physical link.


    正确答案: E,B
    解析: 暂无解析

  • 第13题:

    ● TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.

    (71)A.network interface layer, internet layer, transport layer and application layer

    B.internet layer, network interface layer, transport layer and application layer

    C.network interface layer, transport layer, network interface layer and application layer

    D.application layer, transport layer, internet layer and network interface layer


    正确答案:A

  • 第14题:

    TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.

    A.network interface layer, internet layer, transport layer and application layer

    B.internet layer, network interface layer, transport layer and application layer

    C.network interface layer, transport layer, network interface layer and application layer

    D.application layer, transport layer, internet layer and network interface layer


    正确答案:A
    TCP/IP协议是当今世界上最流行的开放系统协议集,它正在支撑着Internet的正常运转。它由4层组成,由低到高依次为网络接口层.Internet层.传输层.应用层。

  • 第15题:

    Which layer-function is mostly implemented in a network adapter( )。

    A.Physical layer and link layer

    B.Network layer and transport layer

    C.Physical layer and network layer

    D.Transport layer and application layer


    正确答案:A

  • 第16题:

    Which layer-function is mostly implemented in a network adapter?( ).

    A.Physical layer and link layer
    B.Network layer and transport layer
    C.Physical layer and.network layer
    D.Transport layer and application layer

    答案:A
    解析:
    解析:翻译:网卡通常作用于( )?A.物理层和数据链路层B.网络层和传输层C.物理层和网络层D.传输层和应用层

  • 第17题:

    Which of the following layers is associated with the physical hardware address of a network node?()

    • A、Layer 1
    • B、Layer 2
    • C、Layer 6
    • D、Layer 7

    正确答案:B

  • 第18题:

    The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()

    • A、MAC spoofing
    • B、VLAN hopping
    • C、MAC address flooding
    • D、DHCP flooding
    • E、Session hijacking

    正确答案:C

  • 第19题:

    Which two of these are characteristics of MPLS VPNs? ()

    • A、 Layer 3 MPLS VPNs can forward only IP packets
    • B、 Layer 2 MPLS VPNs can forward any network protocol
    • C、 MPL S label paths are automatically formed based on Layer 2 frames
    • D、 Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
    • E、 In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

    正确答案:A,B

  • 第20题:

    Which of the following are advantages of using Dynamic Host Configuration Protocol?()

    • A、IP addresses can be managed from a central point
    • B、Computers can automatically get new addressing when moved to a different network segment
    • C、Media Access Control addresses can be changed automatically
    • D、The network speed can automatically adjust based on the type of traffic being generated
    • E、The HOSTS file on the computer can be validated for proper entries

    正确答案:A,B

  • 第21题:

    多选题
    You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()
    A

    The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is trusted that it isentering the network with the appropriate tag

    B

    No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core

    C

    Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags

    D

    IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off

    E

    MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer

    F

    The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped


    正确答案: C,F
    解析: 暂无解析

  • 第22题:

    单选题
    The network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to befilled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attackis being used here?()
    A

    MAC spoofing

    B

    VLAN hopping

    C

    MAC address flooding

    D

    DHCP flooding

    E

    Session hijacking


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()
    A

    Upgrade the switches

    B

    Configure BPDU guard

    C

    Configure VLAN access lists

    D

    Configure port security

    E

    Configure Dynamic ARP inspection


    正确答案: E
    解析: 暂无解析

  • 第24题:

    单选题
    You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()
    A

    Upgrade the switches

    B

    Configure BPDU guard

    C

    Configure VLAN access lists

    D

    Configure port security

    E

    Configure Dynamic ARP inspection


    正确答案: D
    解析: 暂无解析