What two steps can be taken to help prevent this?
You want to enhance the security within the Company LAN and prevent VLAN hopping. What two
steps can be taken to help prevent this? (Select two)
Which type of Layer 2 attack is being used here?
The Company network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to
be filled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2
attack is being used here?
How does this action benefit the attacker?
A MAC address flood attack is occurring on the Company LAN. During this attack, numerous frames
are forwarded to a switch which causes the CAM table to fill to capacity. How does this action
benefit the attacker?
Which of the following characteristics describe the BPDU Guard feature?
Which of the following characteristics describe the BPDU Guard feature? (Choose all that apply.)
Which of the following are valid modes of accessing the data plane?
Which of the following are valid modes of accessing the data plane? (Choose all that apply.)
Which of the following is not an essential prerequisite for AutoQoS to be correctly applied to an interface?
Which of the following is not an essential prerequisite for AutoQoS to be correctly applied to an
interface? (Choose all that apply.)
Which of the following topology situations would be a qood candidate for configuring DMVPN?
Which of the following topology situations would be a qood candidate for configuring DMVPN?
Which of the following is not considered a common approach to narrow the field of potential problem causes?
Which of the following is not considered a common approach to narrow the field of potential
problem causes? (Choose the best answer.)
Which of the following best describes the following command: ip flow-export destination 192.168.1.50 1500?
Which of the following best describes the following command: ip flow-export destination 192.168.1.50 1500?
Which of the following are valid methods of providing a router with information concerning the location of the
Which of the following are valid methods of providing a router with information concerning the
location of the RP? (Choose all that apply.)