Show
REALIZAR TEST Título del test: Descripción: Autor: Fecha de Creación: Categoría: Número preguntas: 26 No hay ningún comentario sobre este test. Temario: In what situation would a network administrator most likely implement root guard? on all switch ports (used or unused) on all switch ports that connect to a Layer 3 device on all switch ports that connect to host devices on all switch ports that connect to
another switch on all switch ports that connect to another switch that is not the root bridge. Which type of VLAN hopping attack may be prevented by designating an unused?Explanation: Spoofing DTP messages forces a switch into trunking mode as part of a VLAN-hopping attack, but VLAN double tagging works even if trunk ports are disabled. Changing the native VLAN from the default to an unused VLAN reduces the possibility of this type of attack.
How can VLAN hopping attacks be prevented?How to prevent VLAN hopping. Hosts should not be put on the default Ethernet VLAN, or VLAN 1.. The native VLAN on every trunk port must be an unused VLAN ID.. Explicit tagging of the native VLAN should be enabled for all trunk ports.. What are the types of VLAN hopping?There are two primary methods of VLAN hopping: switch spoofing and double tagging. Both attack vectors can be mitigated with proper switch port configuration.
What are three techniques for mitigating VLAN hopping attacks?Here are the three techniques for mitigating VLAN attacks: Use a firewall. Use an intrusion detection system. Configure your switch.
|