Specifications

Ensurepass.com Easy Test! Easy Pass!
Download the complete collection of Exam's Real Q&As www.ensurepass.com
Correct Answer: B
QUESTION 4
Which description correctly describes a MAC address flooding attack?
A. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the
attacking device then becomes the destination address found in the Layer 2 frames sent by
the valid network device.
B. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the
attacking device then becomes the source address found in the Layer 2 frames sent by the
valid network device.
C. The attacking device spoofs a destination MAC address of a valid host currently in the CAM
table. The switch then forwards frames destined for the valid host to the attacking device.
D. The attacking device spoofs a source MAC address of a valid host currently in the CAM table.
The switch then forwards frames destined for the valid host to the attacking device.
E. Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM
table space. The result is that new entries cannot be inserted because of the exhausted CAM
table space, and traffic is subsequently flooded out all ports.
F. Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table
space. The result is that new entries cannot be inserted because of the exhausted CAM table
space, and traffic is subsequently flooded out all ports.
Correct Answer: F
QUESTION 5
Refer to the exhibit. An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to
establish a DHCP server for a man-in-middle attack. Which recommendation, if followed, would
mitigate this type of attack?