Which attack relies on the default automatic trunking configuration on most Cisco switches? Which option best describes a MAC address spoofing attack?Īn attacker gains access to another host and masquerades as the rightful user of that device.Īn attacker alters the MAC address of his host to match another known MAC address of a target host.Īn attacker alters the MAC address of the switch to gain access to the network device from a rogue host device.Īn attacker floods the MAC address table of a switch so that the switch can no longer filter network access based on MAC addresses. With IP voice systems on data networks, which two types of attacks target VoIP specifically? (Choose two.) VLAN 1 should be used for management traffic. With this solution, hopefully it will be a good reference for all of us.Īs a recommended practice for Layer 2 security, how should VLAN 1 be treated?Īll access ports should be assigned to VLAN 1.Īll trunk ports should be assigned to VLAN 1. All the answers has been confirmed to be 100% correct. The questions displayed in this post are based on CCNAS v1.1. This post is about answer for CCNA Security Chapter 6 Test.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |