DHCP Snooping绑定表分为动态绑定表和静态绑定表
DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文
静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间
在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息
第1题:
A.DHCP Snooping绑定表分为动态绑定表和静态绑定表
B.DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文
C.静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间
D.在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息
第2题:
ARP-CHECK功能检查ARP报文合法性的来源有()
第3题:
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
第4题:
基站盲启的正确流程是()
第5题:
As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()
第6题:
DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()
第7题:
下面哪项不是防范ARP攻击的有效方法()。
第8题:
DHCP requests will be switched in the software, which may result in lengthy response times.
The switch will run out of ACL hardware resources.
All DHCP requests will pass through the switch untested.
The DHCP server reply will be dropped and the client will not be able to obtain an IP address.
第9题:
防御改变CHADDR值的饿死攻击
防御DHCP仿冒者攻击
防御TCP flag攻击
防御中间人攻击和IP/MAC Spoofing攻击
第10题:
MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.
Port scanners are the most effective defense against dynamic ARP inspection.
MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.
Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.
DHCP snooping sends unauthorized replies to DHCP queries.
ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
None of the other alternatives apply.
第11题:
DAI intercept all ARP packets on untrusted ports
DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.
DAI is used to prevent against a DHCP Snooping attack.
DAI forwards all ARP packets received on a trusted interface without any checks.
DAI forwards all ARP packets on untrusted ports.
DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
第12题:
配置Trusted/Untrusted接口
限制交换机接口上允许学习到的最多MAC地址数目
使用DHCP Snooping检查DHCP REQUEST报文中CHADDR字段的功能
在交换机上配置DHCP Snooping功能
第13题:
第14题:
Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?()
第15题:
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()
第16题:
An attacker is launching a DoS attack on the Company network using a hacking tool designed to exhaust the IP address space available from the DHCP servers for a period of time. Which procedure would best defend against this type of attack? ()
第17题:
Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()
第18题:
DHCP监听(DHCPSnooping)是一种DHCP安全特性,可以有效防范DHCPSnooping攻击,以下哪条不是该安全特性的描述()。
第19题:
Attacker sends multiple DHCP requests flooding DHCP server
Attacker connects rogue server initiating DHCP requests
Attacker connects rogue server replying to DHCP requests
Attacker sends DHCP jam signal causing DHCP server to crash
Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
第20题:
DHCP Snooping绑定表分为动态绑定表和静态绑定表
DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCPReply报文
静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间
在二层上应用DHCP Snooping,不配置Option82功能也可以获得绑定表所需的接门信息
第21题:
DHCP Snooping绑定表分为动态绑定表和静态绑定表
DHCP Snooping区分信任端口和非信任端口,对非信任端口,不处理DHCP Reply报文
静态绑定表在报文入端口手工输入,也可以手工设置表项老化时间
在二层上应用DHCP Snooping时,不配置Option82功能也可以获得绑定表所需的接口信息
第22题:
Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages.
Configure DHCP snooping globally.
Configure the switch as a DHCP server.
Configure DHCP snooping on an interface.
Configure all interfaces as DHCP snooping trusted interfaces.
Configure DHCP snooping on a VLAN or range of VLANs.
第23题:
防御改变CHADOR值的饿死攻击
防御DHCP仿冒者攻击
防御TCpflag攻击
防御中间人攻击和IP/MACSpoofing攻击
第24题:
DHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.
When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.
The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.
Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.
Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.