欢迎来到建筑考试题库网 建筑考试题库官网
全部科目 > 软件认证工程师考试 > 思科认证考试 > CCNP系列认证 > CCNP(642-813)

单项选择题

Refer to the exhibit. 
What will happen to traffic within VLAN 14 with a source address of  172.16.10.5?()

    A. The traffic will be forwarded to the router processor for further processing.
    B. The traffic will be dropped.
    C. The traffic will be forwarded to the TCAM for further processing.
    D. The traffic will be forwarded without further processing.

点击查看答案

相关考题

  • 单项选择题
    The Company security administrator wants to prevent DHCP spoofing.  Which statement is true  about DHCP spoofing operation?()

    A. DHCP spoofing and SPAN cannot be used on the same port of a switch.
    B. To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.
    C. To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.
    D. DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.
    E. None of the other alternatives apply.

  • 多项选择题
    The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()

    A. ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
    B. ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.
    C. MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
    D. ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.
    E. MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

  • 单项选择题
    YouworkasanetworktechnicianatCompany.Yourboss,Mrs.,isinterestedin switchspoofing. SheasksyouhowanattackerwouldcollectinformationwithVLANhopingthroughswitchspoofing.Youshouldtellherthattheattackingstation...()

    A、...uses VTP to collect VLAN information that is sent out and then tags itself with the domain  information in order to capture the data.
    B、...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a  VLAN that would be inaccessible to the attacker through legitimate means.
    C、...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the  trunk.
    D、...tags itself with all usable VLANs to capture data that is passed through the switch, regardless  of the VLAN to which the data belongs.
    E、None of the other alternatives apply

微信小程序免费搜题
微信扫一扫,加关注免费搜题

微信扫一扫,加关注免费搜题