Get 50% Discount on All Your Purchases at PrepAway.com - Latest Exam Questions This is ONE TIME OFFER 50% Enter your email address to receive your 50% off dicount code: A confirmation link will be sent to this email address to verify your login. GET YOUR DISCOUNT CODE * We value your privacy. We will not rent or sell your email address.
50% Enter your email address to receive your 50% off dicount code: A confirmation link will be sent to this email address to verify your login. GET YOUR DISCOUNT CODE * We value your privacy. We will not rent or sell your email address.
SPECIAL OFFER: GET 50% OFF 50% Use Discount Code: BRIEF50 A confirmation link was sent to your e-mail. Please check your mailbox for a message from support@prepaway.com and follow the directions. Shop Now
50% Use Discount Code: BRIEF50 A confirmation link was sent to your e-mail. Please check your mailbox for a message from support@prepaway.com and follow the directions. Shop Now
Which countermeasures can mitigate ARP spoofing attacks? seenagapeNovember 7, 2017 Which countermeasures can mitigate ARP spoofing attacks? (Choose two.) A. Port security B. DHCP snooping C. IP source guard D. Dynamic ARP inspection Show Answer
megatron says: November 28, 2017 at 9:57 am Disagree. A & D DHCP Snooping does nothing for ARP Spoofing (only if used in combination with IP sourceguard does it actually prevent any kind of spoofing). Port security can be used to restrict to a single MAC, so if spoofed would errdisable the port as it’s over the limit. 0 0
beetleman says: November 29, 2017 at 8:38 pm B and D are correct. DARPI uses DHCP snooping’s database. Port security has no features to mitigate ARP spoofing. Try to find anything about Port security on this page about ARP poisoning: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/white_paper_c11_603839.html You won’t. However this: “Other security features, such as dynamic ARP inspection (DAI), also use information stored in the DHCP snooping binding database.” Which can be found here: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html 1 0
Amergin says: February 27, 2018 at 10:26 pm ^^ . This is clearly correct. Based from the whitepaper on ARP poisoning linked above: “Note that configuring DHCP Snooping is a prerequisite to configure Dynamic ARP Inspection (DAI).” 0 0
Oleg says: January 5, 2018 at 9:56 am Static assignment of allowed mac addresses on the port can definitely mitigate arp spoofing. Agree with megatron. Anyway the question is tricky 0 0
Disagree. A & D
DHCP Snooping does nothing for ARP Spoofing (only if used in combination with IP sourceguard does it actually prevent any kind of spoofing).
Port security can be used to restrict to a single MAC, so if spoofed would errdisable the port as it’s over the limit.
0
0
B and D are correct. DARPI uses DHCP snooping’s database.
Port security has no features to mitigate ARP spoofing. Try to find anything about Port security on this page about ARP poisoning: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/white_paper_c11_603839.html
You won’t.
However this:
“Other security features, such as dynamic ARP inspection (DAI), also use information stored in the DHCP snooping binding database.”
Which can be found here:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html
1
0
^^ . This is clearly correct. Based from the whitepaper on ARP poisoning linked above:
“Note that configuring DHCP Snooping is a prerequisite to configure Dynamic ARP Inspection (DAI).”
0
0
Static assignment of allowed mac addresses on the port can definitely mitigate arp spoofing. Agree with megatron. Anyway the question is tricky
0
0