Show
REALIZAR TEST Título del test: Descripción: Autor: Fecha de Creación: Categoría: Número preguntas: 26 No hay ningún comentario sobre este test. Temario: In what situation would a network administrator most likely implement root guard? on all switch ports (used or unused) on all switch ports that connect to a Layer 3 device on all switch ports that connect to host devices on all switch ports that connect to
another switch on all switch ports that connect to another switch that is not the root bridge. Which type of VLAN hopping attack may be prevented by designating an unused VLAN as?Which type of VLAN-hopping attack may be prevented by designating an unused VLAN as the native VLAN? Explanation: Spoofing DTP messages forces a switch into trunking mode as part of a VLAN-hopping attack, but VLAN double tagging works even if trunk ports are disabled.
What is the best way to prevent a VLAN hopping attack?What is the best way to prevent a VLAN hopping attack?. Disable STP on all nontrunk ports.. Use ISL encapsulation on all trunk links.. Use VLAN 1 as the native VLAN on trunk ports.. Disable trunk negotiation for trunk ports and statically set nontrunk ports as access ports. Answers Explanation & Hints:. Which of the following are methods of VLAN hopping?There are two primary methods of VLAN hopping: switch spoofing and double tagging.
What is VLAN hopping attack?VLAN Hopping is an attack where the attacker is able to send traffic from one VLAN into another. There are two different methods to accomplish this: Double tags: the idea behind the attack is that the attacker is connected to an interface in access mode with the same VLAN as the native untagged VLAN on the trunk.
|