how is the attacker able to gather information?
When an attacker is using switch spoofing to perform VLAN hopping, how is the attacker
able to gather information?
Which protocol inserts a four byte tag into the Ethernet frame and recalculates CRC value?
While using a packet analyzer, you notice four additional bytes being added to the packets in
the Company network. Which protocol inserts a four byte tag into the Ethernet frame and
recalculates CRC value?
How do the switch ports handle the DHCP messages?
Which DTP switchport mode parameter sets the switch port to actively send and respond to DTP negotiation frame
You need to configure a new Company switch to support DTP. Which DTP switchport mode
parameter sets the switch port to actively send and respond to DTP negotiation frames?
Which three statements about Dynamic ARP Inspection are true?
Which three statements about Dynamic ARP Inspection are true? (Choose three.)
What does this interface command accomplish?
A new Company switch was just configured using the “switchport trunk native vlan 7”
command. What does this interface command accomplish?
What information should be gathered before you design the solution?
You are tasked with designing a security solution for your network. What information should
be gathered before you design the solution?
Which statement is true regarding the configuration of ISL trunks?
You need to connect two Company core switches via an ISL trunk. Which statement is true
regarding the configuration of ISL trunks?
Which two components should be part of a security implementation plan?
Which two components should be part of a security implementation plan? (Choose two.)