6-4-2003

11 September 2022
4.7 (114 reviews)
5 test answers

Unlock all answers in this set

Unlock answers (1)
question
Which of the following attacks, if successful, causes his switch to function like a hub?
answer
MAC Flooding
question
Which of the following switch attacks associate the attackers Mac address with the IP address of the victims devices?
answer
ARP Spoofing/Poisoning
question
Which is a typical goal of MAC spoofing?
answer
Bypassing 802.1x port-based security
question
Which protocol should you disable and the user access ports on the switch?
answer
DTP
question
ARP spoofing/poisoning Dynamic trunk and protocol MAC flooding MAC spoofing
answer
This source device sends frames to the attackers MAC address instead of the correct device. Should be disabled on the switches and user ( Access) ports before implementing the switch configuration in to the network. Causes packets to fill up the forwarding table and consumes so much of the switches memory that it enters his state called fail open mode Can be used to hide the identity of the attackers computer or impersonate other devices on the network