What will happen when the host with MAC address 0001.0002.0003 attempts to connect?
The commands below are configured on a Catalyst switch port. What will happen when the host with MAC address 0001.0002.0003 attempts to connect?
switchport port-security
switchport port-security maximum 3
switchport port-security mac-address 0002.0002.0002
switchport port-security violation shutdown
which two statements about VLAN hopping are true?
As a network technician ,you should know the VLAN hopping, can you tell me which two statements about VLAN hopping are true? (Choose two.)
What is a characteristic of a static VLAN membership assignment?
What is a characteristic of a static VLAN membership assignment?
Which method is used to prevent a VLAN hopping attack?
Which method is used to prevent a VLAN hopping attack?
Which type of Layer 2 attack is this?
You work as a network technician, so you should know all types of attacks. The network is flooded with invalid Layer 2 addresses causing switch CAM tables to be filled, and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2 attack is this?
Which feature could be used to restrict access to the switch ports in the building?
The users in a department are using various host platforms, some old and some new. All of them have been approved with a user ID in a RADIUS server database. Which feature could be used to restrict access to the switch ports in the building?
which two features or capabilities are valid options for both an Autonomous and a Lightweight WLAN solution?
You are a network technician , do you know which two features or capabilities are valid options for both an Autonomous and a Lightweight WLAN solution?
Which statement is true about Layer 2 security threats?
Many security administrators don’t think of security when it comes to Layer 2 of the network infrastructure (where switches operate), and it’s one of the most overlooked aspects of network security and reliability. Which statement is true about Layer 2 security threats?
How many different VLANs can be supported by an 802.1Q trunk?
How many different VLANs can be supported by an 802.1Q trunk?
Which network attack can gain unauthorized access to data on a different VLAN by using double tagging?
Which network attack can gain unauthorized access to data on a different VLAN by using double tagging?