题目内容

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()

A. The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
B. Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
C. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
D. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
E. The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
G. None of the other alternatives apply

查看答案
更多问题

下列选项中属于中国四大国有商业银行的是()。

A. 中国工商银行
B. 中国交通银行
C. 中国招商银行
D. 中国华夏银行

雪松针叶1―2针一束,与马尾松同属。

A. 正确
B. 错误

试叙述提高放矿生产效率的方法和途径?

做好网上舆论工作是一项长期任务,要()。

A. 创新改进网上宣传
B. 运用网络传播规律
C. 弘扬主旋律
D. 激发正能量

答案查题题库