PrepAway - Latest Free Exam Questions & Answers

how are DHCP messages authenticated in the DHCP snooping process?

You work as a Cisco engineer. You know Dynamic Host Configuration Protocol (DHCP) well, so
how are DHCP messages authenticated in the DHCP snooping process?

PrepAway - Latest Free Exam Questions & Answers

A.
Untrusted sources are identified by configuring their connecting interfaces.

B.
Traffic is blocked if it matches MAC addresses of invalid DHCP servers.

C.
Untrusted sources are matched against a database of valid Dynamic Host Configuration Protocol bindings.

D.
Trusted sources are matched by identifying RFC-consistent Dynamic Host Configuration Protocol calls.


Leave a Reply